ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Research
Pure sciences
Education
Electrical and electronic
Biology
Industrial engineer
Economy
all records (44)

Languages
English
German
Spanish

Countries
Indonesia
USA
India
Austria
Canada
Malaysia
Bosnia Herzegovina
Croatia
Romania
Turkey, Turkish Republic
all records (32)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (19)

Filter  
 
303  Articles
1 of 31 pages  |  10  records  |  more records»
Passwords are considered the most commonly used method of authentication.  Unfortunately, weak passwords are known to be the main cause of many cyber attacks.  With stronger passwords, it is believed that this first line of defence would be able... see more

Mobile commerce or m-commerce is an electronic trading system (e-commerce) that uses mobile equipment such as mobile phones, smart phones, PDAs, and notebooks. With the growth of smartphone users throughout the world, many electronic commerce business own... see more

Alphanumerical password is the password scheme that obligates the users to enter characters as their password. In spite of its popularity, alphanumerical password usually can be cracked easily when it is used by novice users. Since these users usually typ... see more

Secret keys connecting users to the system is the heart of cryptographic systems. With the recent wars, several cryptographic systems that use alpha-numeric passwords have been known to be vulnerable to many attacks. Image based password systems were intr... see more

Teknologi sudah menjadi unsur utama dalam pelayanan jasa perbankan. Setiap nasabah memiliki akun yang bisa dimanfaatkan untuk berbagai fitur layanan perbankan. Untuk mengakses akun tersebut diperlukan password yang secure supaya tidak mudah diakses oleh o... see more

Security is the prime concern in our day to day life while performing any activity. In the current scenario, accidental death of lineman is often read and evidenced. In this direction, a safety measure to safe guard the operator is found very necessary lo... see more

Password created to secure something against access from unauthorized persons. The longer the password created increasingly long and complex with a view to improving safety. Graphic processing unit can be used as a suitable medium to guess a password comb... see more

The standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is ... see more

1 of 31 pages  |  10  records  |  more records»