Web application authentication using visual cryptography and cued clicked point recall-based graphical password
MO Kenneth, SM Olujuwon - Journal of Computer …, 2021 - journals.bilpubgroup.com
Alphanumerical usernames and passwords are the most used computer authentication
technique. This approach has been found to have a number of disadvantages. Users, for …
technique. This approach has been found to have a number of disadvantages. Users, for …
Fault detection model for software correctness and reliability
E Nicholas, O Nwosu, A Chilaka, P Obichukwu… - … : Proceedings of 5th …, 2021 - Springer
We evaluate various technical developments in software testing and fault detection that are
currently advanced as potential breakthroughs in determining software correctness and …
currently advanced as potential breakthroughs in determining software correctness and …
[PDF][PDF] Continuous Software Engineering and Unit Testing: From Theory to Practice
With the Agile development approach, the software industry has moved to a more flexible
and continuous Software Development Life Cycle (SDLC), which integrates the stages of …
and continuous Software Development Life Cycle (SDLC), which integrates the stages of …
[PDF][PDF] The present work was submitted to Learning Technologies Research Group Diese Arbeit wurde vorgelegt am Lehr-und Forschungsgebiet Informatik 9
M Abdullah - 2022 - publications.rwth-aachen.de
Furthermore, I would like to express my gratitude to my friends Asad Tariq and Faizan
Hassan. I find it difficult to describe how important our friendship is to me. I could remember …
Hassan. I find it difficult to describe how important our friendship is to me. I could remember …