Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …
breaches. To protect sustainability, websites' authentication procedures should continuously …
The Practicality of Adopting Blockchain‐Based Distributed Identity Management in Organisations: A Meta‐Synthesis
SSM Mulaji, SS Roodt - Security and Communication Networks, 2021 - Wiley Online Library
Blockchain has become an irresistible disruptive technology with the potential to innovate
businesses. Ignoring it may in itself result in a competitive disadvantage for organisations …
businesses. Ignoring it may in itself result in a competitive disadvantage for organisations …
BDPM: A secure batch dynamic password management scheme in industrial internet environments
J Feng, R Yan, G Han, W Zhang - Future Generation Computer Systems, 2024 - Elsevier
The rapid development of Industrial Internet has promoted the deep integration of
Information Technology (IT) and Industrial Control (IC), so that network attacks have …
Information Technology (IT) and Industrial Control (IC), so that network attacks have …
PassImg: A Secure Password Generation and Management Scheme without Storing
Y Yin, J Jang-Jaccard, N Baghaei - 2022 IEEE 25th …, 2022 - ieeexplore.ieee.org
Text password is an important authentication method for computer supported cooperative
systems and is usually required to be memorable, strong, and non-reusable. Some …
systems and is usually required to be memorable, strong, and non-reusable. Some …
MonoPass: a password manager without master password authentication
H Jeong, H Jung - Companion Proceedings of the 26th International …, 2021 - dl.acm.org
Passwords are the most common user authentication methods. Password policies regulate
passwords to a certain degree of complexity, which also makes it difficult for users to create …
passwords to a certain degree of complexity, which also makes it difficult for users to create …
Current topics of interdisciplinary cooperation between engineering and human sciences
A Dressler, N Gerber, A Menig, O Pasnicu… - Zeitschrift für …, 2023 - Springer
In this article, we highlight current research directions in the Technikpsychologie research
area, using the example of the interdisciplinary research work of FAI (Work and Engineering …
area, using the example of the interdisciplinary research work of FAI (Work and Engineering …
Random Password Generation
K Smith - 2022 - digitalcommons.odu.edu
Random Password Generation Page 1 Old Dominion University ODU Digital Commons
Cybersecurity Undergraduate Research 2022 Spring Cybersecurity Undergraduate …
Cybersecurity Undergraduate Research 2022 Spring Cybersecurity Undergraduate …
Technological, organisational, and environmental factors affecting the adoption of blockchain-based distributed identity management in organisations
SM Mulaji - 2023 - open.uct.ac.za
Background: Blockchain is a disruptive technology with the potential to innovate businesses.
Ignoring or resisting it might result in a competitive disadvantage for organisations. Apart …
Ignoring or resisting it might result in a competitive disadvantage for organisations. Apart …
The Research on Methods for Generating Random Passwords
O Kubariev, O Piatykop, O Pronina… - … on Information and …, 2023 - ieeexplore.ieee.org
Today, passwords are used to protect various personal, financial and other information in
our daily lives. To ensure security, these passwords must be of high complexity, ie so that …
our daily lives. To ensure security, these passwords must be of high complexity, ie so that …
[PDF][PDF] Privacy-Sovereign Interaction: Enabling Privacy-Sovereignty for End-Users in the Digital Era
K Marky - 2021 - tuprints.ulb.tu-darmstadt.de
As a result of the ongoing digitization, people are increasingly interacting with digital data.
Since these data can contain sensitive personal information, the privacy of users plays a …
Since these data can contain sensitive personal information, the privacy of users plays a …