期刊文献+
共找到1,854篇文章
< 1 2 93 >
每页显示 20 50 100
A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs
1
作者 Sameh Zarif Hadier Moawad +4 位作者 Khalid Amin Abdullah Alharbi Wail SElkilani Shouze Tang Marian Wagdy 《Computer Systems Science & Engineering》 2025年第1期79-98,共20页
Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity.Cloud computing provides a shared electronic device resource for users via the internet,and the authentication ... Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity.Cloud computing provides a shared electronic device resource for users via the internet,and the authentication techniques used must protect data from attacks.Previous approaches failed to resolve the challenge of making passwords secure,memorable,usable,and time-saving.Graphical Password(GP)is still not widely utilized in reality because consumers suffer from multiple login stages.This paper proposes an Indexed Choice-Based Graphical Password(ICGP)scheme for improving the authentication part.ICGP consists of two stages:registration and authentication.At the registration stage,the user registers his/her data user name a number called Index Number(IN),and chooses an image from a grid of images.After completing the registration,ICGP gives the user a random unique number(UNo)to be a user ID.At the authentication stage,the user chooses a different image from the grid based on the random appearance of the registered image dimensions on the grid plus the registered Index Number.ICGP password is a combination of three factors;user’s name,UNo,and any image.According to the experiments,the proposed ICGP has achieved great improvements when compared to prior methods.The ICGP has increased the possible password numbers from 9.77e+6 to 3.74e+30,the password space from 1.20e+34 to 1.37e+84,and decreased the password entropy from 7.16e−7 to 8.26e−30. 展开更多
关键词 AUTHENTICATION graphical password indexed choice-based graphical password user image system user number index number password space password entropy
在线阅读 下载PDF
TGI-FPR: An Improved Multi-Label Password Guessing Model
2
作者 Wei Ou Shuai Liu +3 位作者 Mengxue Pang Jianqiang Ma Qiuling Yue Wenbao Han 《Computers, Materials & Continua》 2025年第7期463-490,共28页
TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password secur... TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password security research.However,through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information,we identified that the model fails to consider popular passwords and frequent substrings,and it uses overly broad personal information categories,with extensive duplicate statistics.To address these issues,we propose an improved password guessing model,TGI-FPR,which incorporates three semantic methods:(1)identification of popular passwords by generating top 300 lists from similar websites,(2)use of frequent substrings as new grammatical labels to capture finer-grained password structures,and(3)further subdivision of the six major categories of personal information.To evaluate the performance of the proposed model,we conducted experiments on six large-scale real-world password leak datasets and compared its accuracy within the first 100 guesses to that of TarGuess-I.The results indicate a 2.65%improvement in guessing accuracy. 展开更多
关键词 password analysis personally identifiable information frequent substring password guessing model
在线阅读 下载PDF
互联网医院建设中基于密码管理的主动防御体系的建立与应用
3
作者 张刚 莫禹钧 梁永浩 《信息与电脑》 2026年第5期136-138,共3页
文章构建了基于密码管理的主动防御体系,运用网络策略与安全设备搭建网络安全访问机制,自主开发密码管理系统,并通过分级访问控制、分组访问控制等主动防御机制,实现对服务器、网络设备等密码的全生命周期管理,同时涵盖网络与系统的访... 文章构建了基于密码管理的主动防御体系,运用网络策略与安全设备搭建网络安全访问机制,自主开发密码管理系统,并通过分级访问控制、分组访问控制等主动防御机制,实现对服务器、网络设备等密码的全生命周期管理,同时涵盖网络与系统的访问监测及控制。应用结果显示,该体系能有效满足医院关键信息基础设施的密码安全需求,实现网络与系统安全可控。这不仅能提升密码管理效率,还可生成管理报表。该体系实现了密码信息化与安全管理,增强了医院信息网络安全性,为医院高质量发展提供了保障。 展开更多
关键词 密码管理 主动防御 安全管理
在线阅读 下载PDF
大语言模型驱动的口令管理系统优化与实践
4
作者 刘志勇 何道敬 +3 位作者 成嘉轩 陈志雄 梁承东 彭世强 《智能系统学报》 北大核心 2026年第1期257-271,共15页
随着互联网服务的增多,口令管理成为一大挑战。尽管口令管理系统是安全的解决方案,但其可用性受到口令强度评估器和非随机口令生成器设计缺陷的制约,导致口令评估不准确、生成口令强度不足且难以记忆。为解决这些问题,提出了一种基于大... 随着互联网服务的增多,口令管理成为一大挑战。尽管口令管理系统是安全的解决方案,但其可用性受到口令强度评估器和非随机口令生成器设计缺陷的制约,导致口令评估不准确、生成口令强度不足且难以记忆。为解决这些问题,提出了一种基于大语言模型的口令管理系统优化方案。该方案结合微调技术与检索增强生成技术,设计了专门针对口令安全的大语言模型,能够有效识别脆弱口令并提取深层语义特征。同时,创新的非随机口令生成器框架提升了生成口令的强度和易记忆性。通过改进的Zxcvbn算法和口令猜测模型,优化了口令强度评估器的准确性。该方案显著提高了口令管理系统的可用性,促进了其在实际应用中的普及。 展开更多
关键词 网络安全 密码管理 身份认证 人工智能 大语言模型 口令管理系统 口令破解 口令强度计 口令生成器
在线阅读 下载PDF
CMOS中PASSWORD的清除
5
作者 刘辉 吴赟 《微机发展》 1996年第2期14-15,共2页
本文介绍微机CMOS被加锁后的几种解锁方法
关键词 CMOS存储器 存储器 password CMOS
在线阅读 下载PDF
Multilevel Military Image Encryption Based on Tri-Independent Keying Approach
6
作者 Shereen S.Jumaa Mohsin H.Challoob Amjad J.Humaidi 《Computers, Materials & Continua》 2026年第4期1548-1564,共17页
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military... Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems. 展开更多
关键词 Military image encryption pixel-level scrambling bit-level manipulation block-level shuffling password hashing dynamic encryption key spatial pixel correlation chaotic system
在线阅读 下载PDF
基于单片机的电子密码锁设计
7
作者 陈菲 陈贵霖 《工业控制计算机》 2026年第3期166-167,170,共3页
密码锁作为一种安全可靠的门禁方式,相较于传统机械锁,具备防锈、防复制等诸多优势,已被广泛应用。为进一步满足人们对安全与便利的双重需求,设计并开发了一款智能电子密码锁。该密码锁以STC89C52单片机为主控制器,能够精准控制门锁开... 密码锁作为一种安全可靠的门禁方式,相较于传统机械锁,具备防锈、防复制等诸多优势,已被广泛应用。为进一步满足人们对安全与便利的双重需求,设计并开发了一款智能电子密码锁。该密码锁以STC89C52单片机为主控制器,能够精准控制门锁开关。它支持密码输入和指纹识别等多种开锁方式,用户可通过矩阵键盘或指纹模块输入密码,系统会将输入密码与预设密码进行比对,匹配成功则开启电子锁,匹配失败时不仅保持锁定状态,还会触发蜂鸣器报警。智能电子密码锁的设计,显著提升了门锁的安全性,增强了开锁的便捷性。 展开更多
关键词 密码锁 指纹模块 矩阵键盘 蜂鸣器
在线阅读 下载PDF
基于国密SM9与格密码LWE的公钥可搜索加密方案研究
8
作者 董过 《计算机应用文摘》 2026年第3期67-69,共3页
针对现有可搜索加密方案在抗量子攻击和计算效率上的不足,提出了一种融合国密SM9算法与格密码LWE的公钥可搜索加密方案。该方法首先基于SM9标识密码体系构建了轻量级的密钥生成与用户认证框架,确保方案在经典计算环境下的高效性与身份... 针对现有可搜索加密方案在抗量子攻击和计算效率上的不足,提出了一种融合国密SM9算法与格密码LWE的公钥可搜索加密方案。该方法首先基于SM9标识密码体系构建了轻量级的密钥生成与用户认证框架,确保方案在经典计算环境下的高效性与身份安全性;其次利用格密码LWE问题的抗量子特性,设计了密文索引与陷门生成算法,通过多项式环LWE困难问题实现了搜索过程中的数据隐私保护与抗量子攻击能力;最后结合双线性对和格上陷门函数,实现了密文检索功能的无交互安全验证。 展开更多
关键词 可搜索加密 SM9算法 格密码 抗量子攻击
在线阅读 下载PDF
基于数据挖掘的电子秤作弊密码预测模型研究
9
作者 高建斌 《计量与测试技术》 2026年第3期60-63,共4页
电子计价秤作为贸易结算的关键计量器具,其作弊行为会严重损害消费者权益与市场公平。本文通过分析已破解的作弊电子秤启动密码数据,提取密码特征与隐藏规律,并运用频率分析、关联规则等数据挖掘技术,深度剖析数字组合、按键顺序及特殊... 电子计价秤作为贸易结算的关键计量器具,其作弊行为会严重损害消费者权益与市场公平。本文通过分析已破解的作弊电子秤启动密码数据,提取密码特征与隐藏规律,并运用频率分析、关联规则等数据挖掘技术,深度剖析数字组合、按键顺序及特殊功能键的使用规律,从而构建高准确率的作弊密码预测模型,以提高现场破解未知作弊秤的成功率,为维护市场公平秩序提供有力的技术支撑。 展开更多
关键词 电子计价秤 作弊密码 数据挖掘 预测模型 关联规则
在线阅读 下载PDF
Password Pattern and Vulnerability Analysis for Web and Mobile Applications 被引量:1
10
作者 LI Shancang Imed Romdhani William Buchanan 《ZTE Communications》 2016年第B06期32-36,共5页
Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Sh... Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy and Minimum entropy. We show how to substantially improve upon the strength of passwords based on the analysis of text-password entropies. By analyzing the passwords datasets of Rockyou and 163.com, we believe strong password can be designed based on good usability, deployability, rememberbility, and security entropies. 展开更多
关键词 password strength security entropies password vulnerabilities
在线阅读 下载PDF
Simple and Efficient Password-Based Authenticated Key Exchange Protocol 被引量:1
11
作者 王立斌 潘嘉昕 马昌社 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期459-465,共7页
Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable n... Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable network with a secure session key.In this paper,we propose a simple,efficient and provably secure PAKE protocol based on Diffie-Hellman key exchange and cryptographic hash function.Our protocol is secure against dictionary attacks.Its security is proved based on the hardness of the computational Diffie-Hellman problem in the random oracle model. 展开更多
关键词 password authentication key exchange provable security
原文传递
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation 被引量:1
12
作者 Shunying Lyu Qian Yao Jianhua Song 《China Communications》 SCIE CSCD 2022年第10期92-101,共10页
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ... Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords. 展开更多
关键词 password generation strategy password security mnemonic passwords
在线阅读 下载PDF
Implementation of a TPM-Based Security Enhanced Browser Password Manager 被引量:1
13
作者 HE Yuchen WANG Rui SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期56-62,共7页
In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which... In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable. 展开更多
关键词 trusted platform module(TPM) password manager trusted encryption decryption
原文传递
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
14
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange password elliptic curve cryptosystem SECURITY
在线阅读 下载PDF
Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1
15
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 authentication CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
CM-Droid: Secure Container for Android Password Misuse Vulnerability 被引量:1
16
作者 Wen Zhang Keyue Li +2 位作者 Tianyang Li Shaozhang Niu Zhenguang Gao 《Computers, Materials & Continua》 SCIE EI 2019年第4期181-198,共18页
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However... Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used correctly.As a result,security vulnerabilities are generated.Based on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability.And on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid. 展开更多
关键词 password misuse evaluation model secure container dynamic repair
在线阅读 下载PDF
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things 被引量:1
17
作者 张华 高飞 +1 位作者 温巧燕 金正平 《China Communications》 SCIE CSCD 2011年第1期72-78,共7页
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ... Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient. 展开更多
关键词 Internet of Things password BROADCAST UNICAST direct communication across realms
在线阅读 下载PDF
Norton Utilities8.0中Password的解除
18
作者 曲得双 彭卉 《黑龙江水利科技》 1996年第3期95-97,共3页
NortonUtilities8.0中Password的解除曲得双,彭卉(黑龙江省水利水电勘测设计研究院)[关键词]Password,偏异量,异或运算,解除NortonUtilities是由Norton公司推出的功能... NortonUtilities8.0中Password的解除曲得双,彭卉(黑龙江省水利水电勘测设计研究院)[关键词]Password,偏异量,异或运算,解除NortonUtilities是由Norton公司推出的功能强大的实用工具组。它能够进行数据恢... 展开更多
关键词 password 偏异量 异或运算 解除
在线阅读 下载PDF
基于RESTful以及Salted Password Hashing算法的模拟试衣间系统 被引量:1
19
作者 夏禹 《现代信息科技》 2019年第11期196-198,共3页
本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软... 本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软件系统中能够发挥重要作用,以及RESTful架构下软件系统的使用设计、实现方案及REST设计规范为实际软件编程带来的便利。 展开更多
关键词 模拟试衣间系统 RESTFUL 前后端分离 Salted password HASHING
在线阅读 下载PDF
Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
20
作者 谢琪 刘文浩 +3 位作者 王圣宝 胡斌 董娜 于秀源 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期418-424,共7页
User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are... User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are two key problems for designing smart cart and password based user authentication scheme. In 2011, Li and Lee proposed a new smart cart and password based user authentication scheme with smart card revocation, and claimed that their scheme could be immunity to these attacks. In this paper, we show that Li and Lee's scheme is vulnerable to off-line password guessing attack once the information stored in smart card is extracted, and it does not provide perfect forward secrecy. A robust user authentication scheme with smart card revocation is then proposed. We use a most popular and widely used formal verification tool ProVerif, which is based on applied pi calculus, to prove that the proposed scheme achieves security and authentication. 展开更多
关键词 user authentication smart card password PROTOCOL SECURITY
原文传递
上一页 1 2 93 下一页 到第
使用帮助 返回顶部