Filters








1,407 Hits in 3.3 sec

Using Fingerprint Authentication to Reduce System Security: An Empirical Study

S.T Chithra, P.A.Dayalin Abisha
2019 International Journal of Recent Trends in Engineering and Research  
However, across our entire study, the passwords connected to fingerprintusing accounts were 1 th the strength of passwords for the 2980 password-only accounts.  ...  In our study, 96 volunteers each created a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.  ...  For passwords that we are currently unable to crack it still gives us some information about which passwords will be cracked sooner than others if we continued to employ our cracking techniques.  ... 
doi:10.23883/ijrter.conf.20190304.009.7m9ix fatcat:yxwzpaiwubew7c3qpuf5bdpwia

Using Fingerprint Authentication to Reduce System Security: An Empirical Study

Hugh Wimberly, Lorie M. Liebrock
2011 2011 IEEE Symposium on Security and Privacy  
In our study, 96 volunteers each created a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.  ...  When using the fingerprint reader, users created passwords that would take one three-thousandth as long to break, thereby potentially negating the advantage twofactor authentication could have offered.  ...  For passwords that we are currently unable to crack it still gives us some information about which passwords will be cracked sooner than others if we continued to employ our cracking techniques.  ... 
doi:10.1109/sp.2011.35 dblp:conf/sp/WimberlyL11 fatcat:pjrhqjtic5b73h35y3a7rmb5gi

A Canonical Password Strength Measure [article]

Eugene Panferov
2016 arXiv   pre-print
We notice that the "password security" discourse is missing the most fundamental notion of the "password strength" -- it was never properly defined.  ...  This paper does NOT advise you to include "at least three capital letters", seven underscores, and a number thirteen in your password.  ...  The attacker is trying to crack the password not the software nor hardware.  ... 
arXiv:1505.05090v4 fatcat:rrv3bqylsrdcticsedjezje5ji

Managing the Security of Nursing Data in the Electronic Health Record

Mahnaz Samadbeik, Zahra Gorzin, Masomeh Khoshkam, Masoud Roudbari
2015 Acta Informatica Medica  
Data was analyzed through Spss Version 18 and by descriptive and analytic statistics.  ...  The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant  ...  system to prevent password cracking or possible attacks 90 70 access to servers by authorized people 90 90 the hardware and software maintain by authorized staffs and contractors 50 100 the hardware and  ... 
doi:10.5455/aim.2015.23.39-43 pmid:25870490 pmcid:PMC4384867 fatcat:tjo5xch4tnbujem2ja5rst2atu

Mnemonic Passwords Practices in Corporate Sites in Nigerian

Egwali Annie Oghenerukevbe
2009 Social Science Research Network  
Her area of interests includes Information Technology, Software Engineering, Gender studies, E-commerce, Electronic Marketing and Software Security.  ...  passwords and to evaluate the effectiveness of mnemonic passwords.  ...  reasons and they were assured of the confidentiality of their responses to the questionnaire.  ... 
doi:10.2139/ssrn.1430854 fatcat:s6fhwexcijd5xjytqo7ebhdge4

On countering online dictionary attacks with login histories and humans-in-the-loop

Paul C. Van Oorschot, Stuart Stubblebine
2006 ACM Transactions on Privacy and Security  
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in a login protocol by Pinkas and Sander (2002) to protect against online password-guessing attacks.  ...  passwords can be cracked in a relatively small number of guesses).  ...  For similar reasons, we assume client software leaves no residual data on user machines after a login protocol ends (e.g., memory is cleared as each user logs out).  ... 
doi:10.1145/1178618.1178619 fatcat:pcjfwf3dtrdrpmrcjzt5vhptti

The Study of Second-degree Professional "Police Information System Application" Based on Course Teaching and Reform

Wu Shaobing, Cui Ying, Zhao Qingshan, Jia Xueming
2011 Procedia Environmental Sciences  
Adopt what methods, how to crack. Therefore, we mainly introduces OFFICE password setup and OFFICE password crack.  ...  String hardware software) How to judge? [键入文字] file is not, a variety of reasons, can recover? 2.2.The integrated application of Word, we choose several cases Making a resume.  ... 
doi:10.1016/j.proenv.2011.12.069 fatcat:krkxdtelbbdufakyb6hrfum6hm

DETERMINANTS OF CRIMES IN THE SPHERE OF INFORMATION TECHNOLOGIES AND SAFETY

Rasulev Abdulaziz Karimovich
2016 International Journal of Advanced Research  
He managed to get access, having cracked the password of the server belonging to the government agency located in the State of Alabama.  ...  James could wander freely about a network and steal several files, including a source code of the international space station. 10 According to the statement of NASA, the cost of the software stolen  ... 
doi:10.21474/ijar01/117 fatcat:wgirsb4r3nfhpgdbxcyqjcaoj4

The Complex World of Corporate CyberForensics Investigations [chapter]

Gregory Leibolt
2010 Springer's Forensic Laboratory Science Series  
This knowledge is valuable in being able to apply the correct character set and password length settings to the password cracking software.  ...  The only choice in this case is to try to crack the password.  ... 
doi:10.1007/978-1-60761-772-3_2 fatcat:k7c43nhusrddngkwprh5wcvgxa

Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study

Amirali Sanatinia, Sashank Narain, Guevara Noubir
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
) that the password will not be cracked or the AP will not be re-flashed after r 1F time minutes.  ...  1 ) that the password will not be cracked or the AP will not be re-flashed after s 1F time minutes.  ... 
doi:10.1109/cns.2013.6682757 dblp:conf/cns/SanatiniaNN13 fatcat:hpekxjo7vrakpb43ybjd6brp5u

OpenLV: Empowering investigators and first-responders in the digital forensics process

Timothy Vidas, Brian Kaplan, Matthew Geiger
2014 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
The result: case backlogs that commonly stretch for months at forensic labs, and per-case processing that occupies days or weeks of analytical effort.  ...  For this reason, OpenLV can export the original, cryptographically-protected credentials for use in password cracking software.  ...  The hashed bootkey previously recovered is used to decrypt each password hash in the SAM for export and possible password cracking.  ... 
doi:10.1016/j.diin.2014.03.006 fatcat:qgxfromgwnf4tey2s26qegm3w4

Exploiting Flaws in Big Data Systems

Michael G. Brown, Paolina Centonze
2016 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Rainbow tables are also an alternative method for password cracking hashes.  ...  If John was able to successfully crack the passwords, it can be viewed with: john --show <out_file>.  ... 
doi:10.24297/ijct.v15i8.1498 fatcat:ojh33mdbzrgqpdo5smvypdbhby

What Motivates Software Crackers?

Sigi Goode, Sam Cruise
2006 Journal of Business Ethics  
Higher social status is a by-product of cracking.  ...  Software piracy is a problem in the software industry, as firms lose revenue when pirated rather than original software is purchased.  ...  This suggests that some crackers apply different reasoning to choosing software to crack and to personally using cracked software.  ... 
doi:10.1007/s10551-005-4709-9 fatcat:7jf5wtur35gq5a3dy6k2o55ghy

IoT Security: An End-to-End View and Case Study [article]

Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff Zou, Xinwen Fu, Wei Zhao
2018 arXiv   pre-print
Based on this view, we systematically present security and privacy requirements in terms of IoT system, software, networking and big data analytics in the cloud.  ...  Mirai tries to crack the username/password of a target IP address up to 10 times. C.  ...  Unlike the malwares such as Code Red worm [44] that exploit software vulnerabilities, the Mirai malware not only scan the devices to discover the open 23/2323 port but also crack the username/password  ... 
arXiv:1805.05853v1 fatcat:sc3t3j7xezhxfdgw5vrb63ngda

TWO-FACTOR AUTHENTICATION METHODS THREATS ANALYSIS

S. P. Evseev, B. P. Tomashevskyy
2015 Radìoelektronika, Ìnformatika, Upravlìnnâ  
Let concider the Analytic attack on the secret key. An attacker can try to bring a printed the PassWindow key combination of a user through the analytical (e.g. statistical or algebraic) attack.  ...  These techniques are vulnerable to the full range of «Man in the middle» attacks for the same reasons that all the authentication methods with an unknown context.  ... 
doi:10.15588/1607-3274-2015-1-7 fatcat:eycun4c56nh57jbb7cmwfq5l2u
« Previous Showing results 1 — 15 out of 1,407 results