-
1
المؤلفون: Qi-Ming Zhang, Ding Wang, Sendong Zhao, Chunguang Ma
المصدر: Journal of Networks. 8
مصطلحات موضوعية: Password, Zero-knowledge password proof, Password policy, Computer Networks and Communications, Computer science, Data_MISCELLANEOUS, Multi-factor authentication, Computer security, computer.software_genre, One-time password, S/KEY, Password strength, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Challenge–response authentication, computer
-
2
المؤلفون: Kirsi Helkala
مصطلحات موضوعية: Password, Password policy, education, Cognitive password, Software_OPERATINGSYSTEMS, General Computer Science, business.industry, Computer science, Internet privacy, Passphrase, Computer security, computer.software_genre, One-time password, S/KEY, Password strength, Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424 [VDP], ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, password security, business, computer, Password psychology, personnel authentication
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::07bd0c567f9f9da3b2e3aa1c0eb46891
https://hdl.handle.net/11250/142524 -
3
المؤلفون: Wei-Hsun Lee, Kuan-Chieh Liao
المصدر: Journal of Networks. 5
مصطلحات موضوعية: Password, Password policy, Zero-knowledge password proof, Cognitive password, Computer Networks and Communications, business.industry, Computer science, Computer security, computer.software_genre, One-time password, Password strength, S/KEY, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Challenge–response authentication, business, computer, Computer network
-
4
المؤلفون: Zuowen Tan
المصدر: Journal of Networks. 5
مصطلحات موضوعية: Password, Zero-knowledge password proof, Password policy, Cognitive password, Computer Networks and Communications, Computer science, Data_MISCELLANEOUS, Computer security, computer.software_genre, One-time password, Password strength, S/KEY, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Challenge–response authentication, computer
-
5
المؤلفون: Hao Wang, Qiuliang Xu, Xiu Fu
المصدر: Journal of Networks. 4
مصطلحات موضوعية: Encrypted key exchange, Password policy, Zero-knowledge password proof, Computer Networks and Communications, Computer science, Key distribution, Computer security, computer.software_genre, S/KEY, Password strength, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Key derivation function, computer, Group key
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::75b2d4f0449e8d084146f9b1248f51aa
https://doi.org/10.4304/jnw.4.8.763-770 -
6دورية أكاديمية
-
7دورية أكاديمية
-
8
المؤلفون: Tianjie Cao, Hui Cui
المصدر: Journal of Networks. 4
مصطلحات موضوعية: Password, Protocol (science), Scheme (programming language), Point (typography), Computer Networks and Communications, Computer science, Data_MISCELLANEOUS, Oakley protocol, Computer security, computer.software_genre, Ring signature, computer, Key exchange, Anonymity, computer.programming_language
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::9ab9e2ea663f467e6885c9a86f545a76
https://doi.org/10.4304/jnw.4.10.985-992 -
9
المؤلفون: Tao Quan, Tianjie Cao, Bo Zhang
المصدر: Journal of Networks. 4
مصطلحات موضوعية: Password, Authentication, Computer Networks and Communications, Computer science, Information security, Computer security, computer.software_genre, law.invention, Authenticated Key Exchange, law, Session key, Session (computer science), Cryptanalysis, computer, Key exchange
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::78c6f3c35b8ccf5f3e1e9fb30963eb28
https://doi.org/10.4304/jnw.4.4.263-270 -
10
المؤلفون: Yongzhong He, Zhen Han
المصدر: Journal of Networks. 4
مصطلحات موضوعية: Password, Authentication, Dictionary attack, Computer Networks and Communications, Computer science, Data_MISCELLANEOUS, Multi-factor authentication, Computer security, computer.software_genre, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Authentication protocol, Lightweight Extensible Authentication Protocol, Challenge–response authentication, computer, Data Authentication Algorithm
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::eafe4460283c77c1faf97c0e8aa11ceb
https://doi.org/10.4304/jnw.4.3.200-207