期刊文献+
共找到164篇文章
< 1 2 9 >
每页显示 20 50 100
Practical Encrypted Key Agreement Using Passwords
1
作者 WU Shuhua ZHU Yuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1625-1628,共4页
We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does no... We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does not need to carry smart card storing his private information but just needs to know his identity and password. For this purpose, the scheme was implemented over elliptic curves because of their well-known advantages with regard to processing and size constraints. Furthermore, the scheme is provably secure under the assumptions that the hash function closely behaves like a random oracle and that the elliptic curve computational Diffie-Hellman problem is difficult. 展开更多
关键词 PASSWORD encrypted key exchange Diffie-Hellman assumptions
在线阅读 下载PDF
Secure Passwords Using Combinatorial Group Theory
2
作者 Gilbert Baumslag Benjamin Fine +1 位作者 Anja Moldenhauer Gerhard Rosenberger 《Journal of Information Security》 2018年第2期154-167,共14页
Password security is a crucial component of modern internet security. In this paper, we present a provably secure method for password verification using combinatorial group theory. This method relies on the group rand... Password security is a crucial component of modern internet security. In this paper, we present a provably secure method for password verification using combinatorial group theory. This method relies on the group randomizer system, a subset of the MAGNUS computer algebra system and corrects most of the present problems with challenge response systems, the most common types of password verification. Theoretical security of the considered method depends on several results in asymptotic group theory. We mention further that this method has applications for many other password situations including container security. 展开更多
关键词 PASSWORD SECURITY Combinatorial GROUP Theory Free GROUP CRYPTOGRAPHY GROUP Randomizer System
在线阅读 下载PDF
Passwords Management via Split-Key
3
作者 Kenneth Giuliani V. Kumar Murty Guangwu Xu 《Journal of Information Security》 2016年第3期206-214,共9页
This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server. The user’s share... This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server. The user’s share shall be based solely on a selected passphrase. The server’s share shall be generated from the user’s share and the encryption key. The security and trust are achieved by performing both encryption and decryption on the client side. We also address the issue of countering dictionary attack by providing a further enhancement of the scheme. 展开更多
关键词 Password Encryption Password Storage Identity Management Secret Sharing
在线阅读 下载PDF
Honey password vaults tolerating leakage of both personally identifable information and passwords
4
作者 Chao An YuTing Xiao +2 位作者 HaiHang Liu Han Wu Rui Zhang 《Cybersecurity》 2025年第4期182-196,共15页
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner. By generating decoy vau... Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner. By generating decoy vaults for incorrect master password attempts, honey vaults force attackers with the vault’s storage fle to engage in online verifcation to distinguish the real vaults, thus thwarting ofine guessing attacks. However, sophisticated attackers can acquire additional information, such as personally identifable information (PII) and partial passwords contained within the vault from various data breaches. Since many users tend to incorporate PII in their passwords, attackers may utilize PII to distinguish the real vault. Furthermore, if attackers may learn partial passwords included in the real vault, it can exclude numerous decoy vaults without the need for online verifcation. Indeed, both leakages pose serious threats to the security of the existing honey vault schemes. In this paper, we explore two attack vari-antsof the inspired attack scenario, where the attacker gains access to the vault’s storage fle along with acquiring PII and partial passwords contained within the real vault, and design a new honey vault scheme. For security assurance, we prove that our scheme is secure against one of the aforementioned attack variants. Moreover, our experimental fndings suggest enhancements in security against the other attack. In particular, to evaluate the security in multiple leakage cases where both the vault’s storage fle and PII are leaked, we propose several new practical attacks (called PII-based attacks), building upon the existing practical attacks in the traditional single leakage case where only the vault’s storage fle is compromised. Our experimental results demonstrate that certain PII-based attacks achieve a 63–70% accuracy in distinguishing the real vault from decoys in the best-performing honey vault scheme (Cheng et al. in Incrementally updateable honey password vaults, pp 857–874, 2021). Our scheme reduces these metrics to 41–50%, closely approaching the ideal value of 50%. 展开更多
关键词 Honey password vault Personally identifable information passwords
原文传递
TGI-FPR: An Improved Multi-Label Password Guessing Model
5
作者 Wei Ou Shuai Liu +3 位作者 Mengxue Pang Jianqiang Ma Qiuling Yue Wenbao Han 《Computers, Materials & Continua》 2025年第7期463-490,共28页
TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password secur... TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password security research.However,through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information,we identified that the model fails to consider popular passwords and frequent substrings,and it uses overly broad personal information categories,with extensive duplicate statistics.To address these issues,we propose an improved password guessing model,TGI-FPR,which incorporates three semantic methods:(1)identification of popular passwords by generating top 300 lists from similar websites,(2)use of frequent substrings as new grammatical labels to capture finer-grained password structures,and(3)further subdivision of the six major categories of personal information.To evaluate the performance of the proposed model,we conducted experiments on six large-scale real-world password leak datasets and compared its accuracy within the first 100 guesses to that of TarGuess-I.The results indicate a 2.65%improvement in guessing accuracy. 展开更多
关键词 Password analysis personally identifiable information frequent substring password guessing model
在线阅读 下载PDF
NEW REMOTE USER AUTHENTICATION SCHEME USING SMART CARD 被引量:2
6
作者 杨君佐 王永建 周渊 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2012年第2期187-192,共6页
Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ... Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational. 展开更多
关键词 remote user authentication password authentication remote login bilinear pairings
在线阅读 下载PDF
分选式流式细胞仪BD FACSAriaⅢ遇到的问题及解决方案 被引量:1
7
作者 张立霞 倪艳波 +1 位作者 王秀文 宋鹏 《医疗卫生装备》 CAS 2015年第2期151-151,153,共2页
0引言BD公司的分选式流式细胞仪BD FACSAriaⅢ是目前投入中国市场较新的一款,与其前款BD FACSAriaⅡ有部分差别,在使用过程中出现了几个问题。现将分选式流式细胞仪BD FACSAriaⅢ在使用过程中出现的几个问题及其解决方案介绍如下。1开... 0引言BD公司的分选式流式细胞仪BD FACSAriaⅢ是目前投入中国市场较新的一款,与其前款BD FACSAriaⅡ有部分差别,在使用过程中出现了几个问题。现将分选式流式细胞仪BD FACSAriaⅢ在使用过程中出现的几个问题及其解决方案介绍如下。1开机时软件运行出现问题1.1正常状态双击BD软件图标"BD FACSAria soft ware"后进入登录对话框, 展开更多
关键词 流式细胞仪 BD FACSAria 方案介绍 PASSWORD 前款 聚集成团 咨询工程师 液流 实验过程 磷酸盐缓冲溶液
暂未订购
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation 被引量:1
8
作者 Shunying Lyu Qian Yao Jianhua Song 《China Communications》 SCIE CSCD 2022年第10期92-101,共10页
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ... Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords. 展开更多
关键词 password generation strategy password security mnemonic passwords
在线阅读 下载PDF
基于C/S构架动态口令身份认证系统的设计与实现 被引量:2
9
作者 齐兴斌 赵丽 张连华 《电力学报》 2013年第1期66-68,共3页
在一次性口令认证技术的基础上,利用单向散列函数MD5算法,采用口令序列的方式,建立了一个基于客户端/服务器端的一次口令登陆系统,实现了动态口令,也就是OTP。这样的方法在链路上以及服务器端都能有效保护密码的安全,还可以有效地防止... 在一次性口令认证技术的基础上,利用单向散列函数MD5算法,采用口令序列的方式,建立了一个基于客户端/服务器端的一次口令登陆系统,实现了动态口令,也就是OTP。这样的方法在链路上以及服务器端都能有效保护密码的安全,还可以有效地防止密码重用,恶意注册以及来自服务器端的攻击。 展开更多
关键词 口令认证 MD5 OTP(ONE TIME PASSWORD)
在线阅读 下载PDF
Cyber Security Awareness among Students and Faculty Members in a Sudanese College 被引量:1
10
作者 Mohammed Daffalla Elradi Altigani Abd alraheem Altigani Osman Idriss Abaker 《Electrical Science & Engineering》 2020年第2期24-28,共5页
In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of b... In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of being exploited is cyber security awareness.Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks.In this paper we conducted a survey that focuses on three vital security parameters,which are trust,passwords and defensive attitude respectively.The survey mainly aimed at assessing cyber security knowledge of 200 students and 100 faculty members in a Sudanese college and how secure these participants think they are according to their current cyber behaviour.56%of the participants are males and 44%are females.The results revealed that all participants were having fairly-low level of security awareness and their defensive attitude is considerably weak and doesn’t protect them either individually or at institutional-level.Nevertheless,faculty member showed better cyber security knowledge and skills by 8%higher than students.This study can be used to develop training approaches that bridge the security gaps depicted by the respondents of the survey questions manipulated in this study. 展开更多
关键词 Cyber security AWARENESS passwords STUDENTS Faculty members
在线阅读 下载PDF
TDX SYSTEM系统参数丢失后的恢复
11
作者 王卫 黄英 陈维平 《医疗卫生装备》 CAS 2003年第S2期114-114,共1页
关键词 系统参数 第三军医大学 重庆市 西南医院 血药浓度 给药方案 不良反应 检测仪 校正曲线 PASSWORD
在线阅读 下载PDF
CMOS中PASSWORD的清除
12
作者 刘辉 吴赟 《微机发展》 1996年第2期14-15,共2页
本文介绍微机CMOS被加锁后的几种解锁方法
关键词 CMOS存储器 存储器 PASSWORD CMOS
在线阅读 下载PDF
一次性密码验证系统 被引量:1
13
作者 王曦 史闻博 苗放 《物探化探计算技术》 CAS CSCD 2007年第2期177-181,90,共5页
简单介绍一次性密码系统机理,并与现有密码机制进行比较。一次性密码体现出诸多优势,其算法设计灵活、复杂度适中、计算量较小且安全性较高,这里给出了应用该算法设计的登陆系统的实现和工作原理。实践应用证明,该算法的登陆系统应用灵... 简单介绍一次性密码系统机理,并与现有密码机制进行比较。一次性密码体现出诸多优势,其算法设计灵活、复杂度适中、计算量较小且安全性较高,这里给出了应用该算法设计的登陆系统的实现和工作原理。实践应用证明,该算法的登陆系统应用灵活性强,系统资源消耗小,这均表明该算法的高性能及高可用性。 展开更多
关键词 OPA(One-time PASSWORD Algorithms) 一次性密码系统 PAM 安全 攻击
在线阅读 下载PDF
Internet上的医学杂志网址 被引量:2
14
作者 赵坤 张问德 《医学信息学杂志》 CAS 1999年第2期7-9,共3页
随着信息技术的飞速发展,Internet对社会各个方面都产生了前所未有的影响,医学方面也不例外。特别是许多专业医学期刊都在网上发布期刊电子版,电子版期刊一般都比原版期刊早出版1~2个月,提高了期刊利用的时效性,而且阅读费用低廉,这引... 随着信息技术的飞速发展,Internet对社会各个方面都产生了前所未有的影响,医学方面也不例外。特别是许多专业医学期刊都在网上发布期刊电子版,电子版期刊一般都比原版期刊早出版1~2个月,提高了期刊利用的时效性,而且阅读费用低廉,这引起了许多医学工作者的关心和兴趣。 展开更多
关键词 INTERNE 英国医学杂志 网址 医学期刊 期刊利用 电子版期刊 信息技术 航空航天医学 PASSWORD 原版期刊
暂未订购
基于WEB应用的安全通道技术的研究及原型的实现
15
作者 黄浩东 蒋凡 《计算机工程与应用》 CSCD 北大核心 2003年第9期179-181,共3页
内外网的安全通信是许多WEB应用程序的关键,该文提出一种在防火墙隔断的内外网之间建立基于WEB的数据安全通道的方法,并且在这条安全通道中设计了访问控制机制,解决了内外网之间WEB应用的安全问题。
关键词 安全通道SSL(Secure Socket Layer) OPIE(One Time PASSWORD in Everything) HMAC(Keyed HASH MESSAGE Authentication Code)
在线阅读 下载PDF
Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card 被引量:3
16
作者 Jaewook Jung Donghoon Lee +1 位作者 Hakjun Lee Dongho Won 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第1期45-49,共5页
Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recent... Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recently, Liu et al. proposed an efficient and secure smart card based password authentication scheme. However, we find that Liu et al.’s scheme is vulnerable to the off-line password guessing attack and user impersonation attack. Furthermore, it also cannot provide user anonymity. In this paper, we cryptanalyze Liu et al.’s scheme and propose a security enhanced user authentication scheme to overcome the aforementioned problems. Especially, in order to preserve the user anonymity and prevent the guessing attack, we use the dynamic identity technique. The analysis shows that the proposed scheme is more secure and efficient than other related authentication schemes. 展开更多
关键词 AUTHENTICATION off-line password guessing attack smart card user anonymity
在线阅读 下载PDF
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
17
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange PASSWORD elliptic curve cryptosystem SECURITY
在线阅读 下载PDF
An Improved Dictionary Cracking Scheme Based on Multiple GPUs for Wi-Fi Network 被引量:1
18
作者 Majdi K.Qabalin Zaid A.Arida +4 位作者 Omar A.Saraereh Falin Wu Imran Khan Peerapong Uthansakul Moath Alsafasfeh 《Computers, Materials & Continua》 SCIE EI 2021年第3期2957-2972,共16页
The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major ... The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major concern for citizens and governments.The Internet functions and software applications play a vital role in cybersecurity research and practice.Most of the cyber-attacks are based on exploits in system or application software.It is of utmost urgency to investigate software security problems.The demand for Wi-Fi applications is proliferating but the security problem is growing,requiring an optimal solution from researchers.To overcome the shortcomings of the wired equivalent privacy(WEP)algorithm,the existing literature proposed security schemes forWi-Fi protected access(WPA)/WPA2.However,in practical applications,the WPA/WPA2 scheme still has some weaknesses that attackers exploit.To destroy a WPA/WPA2 security,it is necessary to get a PSK pre-shared key in pre-shared key mode,or an MSK master session key in the authentication mode.Brute-force cracking attacks can get a phase-shift keying(PSK)or a minimum shift keying(MSK).In real-world applications,many wireless local area networks(LANs)use the pre-shared key mode.Therefore,brute-force cracking of WPA/WPA2-PSK is important in that context.This article proposes a new mechanism to crack theWi-Fi password using a graphical processing unit(GPU)and enhances the efficiency through parallel computing of multiple GPU chips.Experimental results show that the proposed algorithm is effective and provides a procedure to enhance the security of Wi-Fi networks. 展开更多
关键词 Networks PASSWORD CYBERSECURITY password cracking mechanism
在线阅读 下载PDF
Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card 被引量:1
19
作者 简宏宇 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期436-439,共4页
Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to re... Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users' device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved. 展开更多
关键词 DIFFIE-HELLMAN key agreement forward secrecy AUTHENTICATION PASSWORD
原文传递
Design of intelligent detecting system based on wireless transmission 被引量:1
20
作者 GUO Li-wei LIU Dong-hui +1 位作者 ZHANG Xin-ling SUN Xiao-yun 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第3期490-494,共5页
An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module ... An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module and a 16×16 lattice word database based on e-Flash MM36SB020. Its software is a communication protocol between the central control computer and the entrance management base station. To resolve the conflicting problems occurred during the data transmission, a method of delaying time at random is proposed. 展开更多
关键词 Communication protocol Delaying time Random entrance management base station Random password keyboard Wireless digital transmission
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部