期刊文献+
共找到164篇文章
< 1 2 9 >
每页显示 20 50 100
Intelligent electronic passworded locker with unique and personalized security barriers for home security 被引量:1
1
作者 Xiaoqing Huo Xuelian Wei +5 位作者 Baocheng Wang Xiaole Cao Jiahui Xu Jiaxin Yin Zhiyi Wu Zhong Lin Wang 《Nano Research》 SCIE EI CSCD 2023年第5期7568-7574,共7页
As a widely used security device,the electronic passworded locker is designed to protect personal property and space.However,once the password is leaked to an unauthorized person,its security is lost.Here,with the ass... As a widely used security device,the electronic passworded locker is designed to protect personal property and space.However,once the password is leaked to an unauthorized person,its security is lost.Here,with the assistance of triboelectric nanogenerators(TENGs),we present an intelligent electronic passworded locker(IEPL)based on unique and personalized security barriers,which can accurately extract users’habits of entering passwords through integrated deep learning.The key of the IEPL adopts the single electrode mode of TENG that accurately recognizes the input behavior of a person based on machine learning,which serves as a reliable,unique,unreproducible gate,with advantages of thin thickness,diversified structure,and simple preparation method.Finally,the proposed IEPL offers a reliable solution for improving the overall security of passworded lockers and extending the application of TENG-based sensors in the smart home. 展开更多
关键词 smart home triboelectric nanogenerator deep learning intelligent electronic passworded locker unique and personalized security barriers
原文传递
TGI-FPR: An Improved Multi-Label Password Guessing Model
2
作者 Wei Ou Shuai Liu +3 位作者 Mengxue Pang Jianqiang Ma Qiuling Yue Wenbao Han 《Computers, Materials & Continua》 2025年第7期463-490,共28页
TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password secur... TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password security research.However,through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information,we identified that the model fails to consider popular passwords and frequent substrings,and it uses overly broad personal information categories,with extensive duplicate statistics.To address these issues,we propose an improved password guessing model,TGI-FPR,which incorporates three semantic methods:(1)identification of popular passwords by generating top 300 lists from similar websites,(2)use of frequent substrings as new grammatical labels to capture finer-grained password structures,and(3)further subdivision of the six major categories of personal information.To evaluate the performance of the proposed model,we conducted experiments on six large-scale real-world password leak datasets and compared its accuracy within the first 100 guesses to that of TarGuess-I.The results indicate a 2.65%improvement in guessing accuracy. 展开更多
关键词 Password analysis personally identifiable information frequent substring password guessing model
在线阅读 下载PDF
Explore the Culture Brand Management Strategy of New Media From Li Ziqi’s Return to“Continuous Hot”
3
作者 PAN Zuzhi 《Journalism and Mass Communication》 2024年第6期275-278,共4页
“Li Ziqi”is not only a Chinese girl,but also a cultural brand of new media with certain international influence.Currently,she has more than 20 million fans on the YouTube platform.In July 2021,she stopped making wor... “Li Ziqi”is not only a Chinese girl,but also a cultural brand of new media with certain international influence.Currently,she has more than 20 million fans on the YouTube platform.In July 2021,she stopped making works,and then gradually faded from the public eye.Until November 12,2024,she released her new work“Carved Lacquer With Hidden Flowers,Carrying Auspiciousness!”For a while,the whole network was boiling,netizens rushed to tell each other,the video has been played more than 100 million times,and she easily returned to the“top of flow rate”.In today’s ever-changing world,why does her work continue to be popular after she stopped working for 1,200 days?The way of management is worth thinking about.This paper analyzes the Weibo comments data of her first work of comeback,to explore the cultural brand management strategy of new media. 展开更多
关键词 Li ziqi cultural brand management strategy new media flow rate password
在线阅读 下载PDF
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
4
作者 Smith Patel Vijay K. Madisetti 《Journal of Information Security》 2024年第4期474-493,共20页
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac... In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates. 展开更多
关键词 Phishing Attacks Password Management Phishing Detection AI BERT Algorithm Real-Time Protection CYBERSECURITY URL Authentication
在线阅读 下载PDF
Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol
5
作者 Jianxin Wang Zifan Xu +2 位作者 Xiangze Chang Chaoen Xiao Lei Zhang 《Journal of Electronic Research and Application》 2024年第5期161-167,共7页
With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ... With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication. 展开更多
关键词 Information security USB Key Impact/response authentication Static password authentication
在线阅读 下载PDF
NEW REMOTE USER AUTHENTICATION SCHEME USING SMART CARD 被引量:2
6
作者 杨君佐 王永建 周渊 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2012年第2期187-192,共6页
Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ... Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational. 展开更多
关键词 remote user authentication password authentication remote login bilinear pairings
在线阅读 下载PDF
分选式流式细胞仪BD FACSAriaⅢ遇到的问题及解决方案 被引量:1
7
作者 张立霞 倪艳波 +1 位作者 王秀文 宋鹏 《医疗卫生装备》 CAS 2015年第2期151-151,153,共2页
0引言BD公司的分选式流式细胞仪BD FACSAriaⅢ是目前投入中国市场较新的一款,与其前款BD FACSAriaⅡ有部分差别,在使用过程中出现了几个问题。现将分选式流式细胞仪BD FACSAriaⅢ在使用过程中出现的几个问题及其解决方案介绍如下。1开... 0引言BD公司的分选式流式细胞仪BD FACSAriaⅢ是目前投入中国市场较新的一款,与其前款BD FACSAriaⅡ有部分差别,在使用过程中出现了几个问题。现将分选式流式细胞仪BD FACSAriaⅢ在使用过程中出现的几个问题及其解决方案介绍如下。1开机时软件运行出现问题1.1正常状态双击BD软件图标"BD FACSAria soft ware"后进入登录对话框, 展开更多
关键词 流式细胞仪 BD FACSAria 方案介绍 PASSWORD 前款 聚集成团 咨询工程师 液流 实验过程 磷酸盐缓冲溶液
暂未订购
基于C/S构架动态口令身份认证系统的设计与实现 被引量:2
8
作者 齐兴斌 赵丽 张连华 《电力学报》 2013年第1期66-68,共3页
在一次性口令认证技术的基础上,利用单向散列函数MD5算法,采用口令序列的方式,建立了一个基于客户端/服务器端的一次口令登陆系统,实现了动态口令,也就是OTP。这样的方法在链路上以及服务器端都能有效保护密码的安全,还可以有效地防止... 在一次性口令认证技术的基础上,利用单向散列函数MD5算法,采用口令序列的方式,建立了一个基于客户端/服务器端的一次口令登陆系统,实现了动态口令,也就是OTP。这样的方法在链路上以及服务器端都能有效保护密码的安全,还可以有效地防止密码重用,恶意注册以及来自服务器端的攻击。 展开更多
关键词 口令认证 MD5 OTP(ONE TIME PASSWORD)
在线阅读 下载PDF
TDX SYSTEM系统参数丢失后的恢复
9
作者 王卫 黄英 陈维平 《医疗卫生装备》 CAS 2003年第S2期114-114,共1页
关键词 系统参数 第三军医大学 重庆市 西南医院 血药浓度 给药方案 不良反应 检测仪 校正曲线 PASSWORD
在线阅读 下载PDF
CMOS中PASSWORD的清除
10
作者 刘辉 吴赟 《微机发展》 1996年第2期14-15,共2页
本文介绍微机CMOS被加锁后的几种解锁方法
关键词 CMOS存储器 存储器 PASSWORD CMOS
在线阅读 下载PDF
一次性密码验证系统 被引量:1
11
作者 王曦 史闻博 苗放 《物探化探计算技术》 CAS CSCD 2007年第2期177-181,90,共5页
简单介绍一次性密码系统机理,并与现有密码机制进行比较。一次性密码体现出诸多优势,其算法设计灵活、复杂度适中、计算量较小且安全性较高,这里给出了应用该算法设计的登陆系统的实现和工作原理。实践应用证明,该算法的登陆系统应用灵... 简单介绍一次性密码系统机理,并与现有密码机制进行比较。一次性密码体现出诸多优势,其算法设计灵活、复杂度适中、计算量较小且安全性较高,这里给出了应用该算法设计的登陆系统的实现和工作原理。实践应用证明,该算法的登陆系统应用灵活性强,系统资源消耗小,这均表明该算法的高性能及高可用性。 展开更多
关键词 OPA(One-time PASSWORD Algorithms) 一次性密码系统 PAM 安全 攻击
在线阅读 下载PDF
Internet上的医学杂志网址 被引量:2
12
作者 赵坤 张问德 《医学信息学杂志》 CAS 1999年第2期7-9,共3页
随着信息技术的飞速发展,Internet对社会各个方面都产生了前所未有的影响,医学方面也不例外。特别是许多专业医学期刊都在网上发布期刊电子版,电子版期刊一般都比原版期刊早出版1~2个月,提高了期刊利用的时效性,而且阅读费用低廉,这引... 随着信息技术的飞速发展,Internet对社会各个方面都产生了前所未有的影响,医学方面也不例外。特别是许多专业医学期刊都在网上发布期刊电子版,电子版期刊一般都比原版期刊早出版1~2个月,提高了期刊利用的时效性,而且阅读费用低廉,这引起了许多医学工作者的关心和兴趣。 展开更多
关键词 INTERNE 英国医学杂志 网址 医学期刊 期刊利用 电子版期刊 信息技术 航空航天医学 PASSWORD 原版期刊
暂未订购
基于WEB应用的安全通道技术的研究及原型的实现
13
作者 黄浩东 蒋凡 《计算机工程与应用》 CSCD 北大核心 2003年第9期179-181,共3页
内外网的安全通信是许多WEB应用程序的关键,该文提出一种在防火墙隔断的内外网之间建立基于WEB的数据安全通道的方法,并且在这条安全通道中设计了访问控制机制,解决了内外网之间WEB应用的安全问题。
关键词 安全通道SSL(Secure Socket Layer) OPIE(One Time PASSWORD in Everything) HMAC(Keyed HASH MESSAGE Authentication Code)
在线阅读 下载PDF
Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card 被引量:3
14
作者 Jaewook Jung Donghoon Lee +1 位作者 Hakjun Lee Dongho Won 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第1期45-49,共5页
Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recent... Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recently, Liu et al. proposed an efficient and secure smart card based password authentication scheme. However, we find that Liu et al.’s scheme is vulnerable to the off-line password guessing attack and user impersonation attack. Furthermore, it also cannot provide user anonymity. In this paper, we cryptanalyze Liu et al.’s scheme and propose a security enhanced user authentication scheme to overcome the aforementioned problems. Especially, in order to preserve the user anonymity and prevent the guessing attack, we use the dynamic identity technique. The analysis shows that the proposed scheme is more secure and efficient than other related authentication schemes. 展开更多
关键词 AUTHENTICATION off-line password guessing attack smart card user anonymity
在线阅读 下载PDF
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
15
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange PASSWORD elliptic curve cryptosystem SECURITY
在线阅读 下载PDF
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation 被引量:1
16
作者 Shunying Lyu Qian Yao Jianhua Song 《China Communications》 SCIE CSCD 2022年第10期92-101,共10页
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ... Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords. 展开更多
关键词 password generation strategy password security mnemonic passwords
在线阅读 下载PDF
An Improved Dictionary Cracking Scheme Based on Multiple GPUs for Wi-Fi Network 被引量:1
17
作者 Majdi K.Qabalin Zaid A.Arida +4 位作者 Omar A.Saraereh Falin Wu Imran Khan Peerapong Uthansakul Moath Alsafasfeh 《Computers, Materials & Continua》 SCIE EI 2021年第3期2957-2972,共16页
The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major ... The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major concern for citizens and governments.The Internet functions and software applications play a vital role in cybersecurity research and practice.Most of the cyber-attacks are based on exploits in system or application software.It is of utmost urgency to investigate software security problems.The demand for Wi-Fi applications is proliferating but the security problem is growing,requiring an optimal solution from researchers.To overcome the shortcomings of the wired equivalent privacy(WEP)algorithm,the existing literature proposed security schemes forWi-Fi protected access(WPA)/WPA2.However,in practical applications,the WPA/WPA2 scheme still has some weaknesses that attackers exploit.To destroy a WPA/WPA2 security,it is necessary to get a PSK pre-shared key in pre-shared key mode,or an MSK master session key in the authentication mode.Brute-force cracking attacks can get a phase-shift keying(PSK)or a minimum shift keying(MSK).In real-world applications,many wireless local area networks(LANs)use the pre-shared key mode.Therefore,brute-force cracking of WPA/WPA2-PSK is important in that context.This article proposes a new mechanism to crack theWi-Fi password using a graphical processing unit(GPU)and enhances the efficiency through parallel computing of multiple GPU chips.Experimental results show that the proposed algorithm is effective and provides a procedure to enhance the security of Wi-Fi networks. 展开更多
关键词 Networks PASSWORD CYBERSECURITY password cracking mechanism
在线阅读 下载PDF
Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card 被引量:1
18
作者 简宏宇 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期436-439,共4页
Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to re... Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users' device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved. 展开更多
关键词 DIFFIE-HELLMAN key agreement forward secrecy AUTHENTICATION PASSWORD
原文传递
Design of intelligent detecting system based on wireless transmission 被引量:1
19
作者 GUO Li-wei LIU Dong-hui +1 位作者 ZHANG Xin-ling SUN Xiao-yun 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第3期490-494,共5页
An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module ... An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module and a 16×16 lattice word database based on e-Flash MM36SB020. Its software is a communication protocol between the central control computer and the entrance management base station. To resolve the conflicting problems occurred during the data transmission, a method of delaying time at random is proposed. 展开更多
关键词 Communication protocol Delaying time Random entrance management base station Random password keyboard Wireless digital transmission
在线阅读 下载PDF
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things 被引量:1
20
作者 张华 高飞 +1 位作者 温巧燕 金正平 《China Communications》 SCIE CSCD 2011年第1期72-78,共7页
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ... Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient. 展开更多
关键词 Internet of Things PASSWORD BROADCAST UNICAST direct communication across realms
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部