UofT Libraries is getting a new library services platform in January 2021.
Learn more about the change.

Search Articles

X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (25473) 25473
Journal Article (3455) 3455
Conference Proceeding (2699) 2699
Magazine Article (1377) 1377
Book Chapter (685) 685
Trade Publication Article (662) 662
Web Resource (249) 249
Dissertation (99) 99
Book Review (53) 53
Book / eBook (45) 45
Government Document (22) 22
Newsletter (12) 12
Streaming Video (10) 10
Standard (9) 9
Report (8) 8
Transcript (8) 8
Paper (3) 3
Publication (3) 3
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
passwords (30470) 30470
computer security (3451) 3451
authentication (3102) 3102
network security (2455) 2455
password (2134) 2134
social networks (1840) 1840
internet crime (1594) 1594
internet (1505) 1505
security (1439) 1439
web sites (1365) 1365
science & technology (1318) 1318
inventors (1271) 1271
biometrics (1248) 1248
software (1243) 1243
access control (1208) 1208
data integrity (1196) 1196
computer science (1186) 1186
technology (1185) 1185
data encryption (1114) 1114
servers (970) 970
privacy (952) 952
cryptography (906) 906
security management (852) 852
hackers (777) 777
smartphones (774) 774
personal information (761) 761
computer information security (723) 723
employees (702) 702
computer science, information systems (613) 613
smart cards (610) 610
electronic mail systems (606) 606
engineering (573) 573
malware (563) 563
fraud (562) 562
computers (498) 498
passwort (495) 495
encryption (474) 474
smart card (460) 460
researchers (455) 455
telecommunications (438) 438
protocols (437) 437
dictionaries (428) 428
safety and security measures (424) 424
data security (422) 422
identity theft (422) 422
credit cards (421) 421
engineering, electrical & electronic (414) 414
methods (384) 384
customer services (383) 383
wireless networks (375) 375
algorithms (357) 357
information technology (354) 354
computer viruses (350) 350
cloud computing (345) 345
password authentication (318) 318
automation (305) 305
virtual private networks (304) 304
authentifizierung (303) 303
covid-19 (300) 300
usability (287) 287
operating systems (281) 281
consumers (260) 260
studies (259) 259
customers (257) 257
user authentication (253) 253
internet of things (250) 250
authentication protocols (248) 248
analysis (244) 244
banks (237) 237
networks (237) 237
information security (236) 236
computer science, software engineering (234) 234
graphical password (230) 230
product introduction (225) 225
cellular telephones (224) 224
computer software industry (222) 222
protocol (222) 222
cameras (221) 221
electronic commerce (220) 220
software upgrading (211) 211
usage (206) 206
one-time password (203) 203
research (201) 201
conferences (196) 196
electronic banking (195) 195
computer networks (193) 193
information systems (193) 193
phishing (192) 192
students (191) 191
management (190) 190
coronaviruses (189) 189
electronic mail (188) 188
keyboards (180) 180
computer science, theory & methods (179) 179
banking (176) 176
computer science, hardware & architecture (176) 176
communication (174) 174
graphical passwords (174) 174
personal identification numbers (171) 171
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (33) 33
Gerstein Science - Stacks (7) 7
UTL at Downsview - May be requested (5) 5
Engineering & Comp. Sci. - Stacks (4) 4
UofT at Mississauga - Stacks (3) 3
Robarts - Stacks (2) 2
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Engineering & Comp. Sci. - May be requested in 6-10 wks (1) 1
Gerstein Science - Circulation Desk (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (34478) 34478
Chinese (241) 241
Japanese (135) 135
Korean (45) 45
Czech (18) 18
Swedish (11) 11
German (10) 10
Spanish (9) 9
Portuguese (8) 8
French (7) 7
Hungarian (7) 7
Hindi (4) 4
Lithuanian (4) 4
Urdu (4) 4
Indonesian (3) 3
Russian (2) 2
Afrikaans (1) 1
Arabic (1) 1
Croatian (1) 1
Polish (1) 1
Slovak (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


International journal of human-computer studies, ISSN 1071-5819, 07/2005, Volume 63, Issue 1-2, pp. 102 - 127
Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a... 
Usable security | Alphanumeric password | PassPoints | Graphical password | Authentication | Password security | Psychology, Multidisciplinary | Engineering | Social Sciences | Ergonomics | Technology | Psychology | Computer Science | Computer Science, Cybernetics | Science & Technology
Journal Article
Book
Tudomanyos es Muszaki Tajekoztatas, ISSN 0041-3917, 01/2020, Volume 67, Issue 3, p. 174
Egy jelszavak erősségével kapcsolatos tévhitre, illetve az igazán erős, nagyon nehezen feltörhető belépőkód kitalálásának egyik módjára hívta fel a figyelmet... 
Passwords
Journal Article
ACM computing surveys, ISSN 0360-0300, 08/2012, Volume 44, Issue 4, pp. 1 - 41
Starting around 1999, a great many graphical password schemes have been proposed as alternatives to text-based password authentication. We provide a... 
graphical passwords | usable security | Authentication | Usable security | Graphical passwords | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology | Management | Research | Data security | Security management | Access control (Computers) | Studies | User interface | Research methodology | Passwords | Authentication protocols
Journal Article
PC Quest, ISSN 0971-216X, 05/2019
Journal Article
07/2020
Web Resource
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 173 - 186
Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets,... 
passwords | password security | authentication
Conference Proceeding
Web Resource
Nonlinear dynamics, ISSN 0924-090X, 3/2016, Volume 83, Issue 4, pp. 2085 - 2101
Due to its high level of security, three-factor authentication combining password, smart card and biometrics has received much interest in the past decades.... 
Key agreement | Biometrics | Anonymity | Smart card | Engineering | Vibration, Dynamical Systems, Control | Privacy | Chaotic map | Authentication | Mechanics | Automotive Engineering | Mechanical Engineering | Password | Technology | Engineering, Mechanical | Science & Technology | Fraud | Access control | Smart cards | Maps | Islam | Passwords | Security | Nonlinear dynamics | Chaos theory | Resists
Journal Article
Kids, code and computer science magazine, ISSN 2377-1216, 12/2015
Use dice from a board game or toy store to create a difficult to crack secure password and phrases that you can remember. 
Passwords
Journal Article
Journal of computer security, ISSN 0926-227X, 2011, Volume 19, Issue 4, pp. 699 - 702
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points... 
dictionary attack | PassPoints | password guessing | human-seeded attacks | passwords | Graphical passwords | hot spots | human computation | user choice | click-order patterns | empirical studies | Images | Passwords | Field tests | Markov processes | On-line systems | Strategy | Mathematical models | Computer information security
Journal Article
IEEE transactions on dependable and secure computing, ISSN 1941-0018, 03/2018, Volume 15, Issue 2, pp. 180 - 193
Journal Article
IEEE transactions on information forensics and security, ISSN 1556-6021, 09/2015, Volume 10, Issue 9, pp. 1953 - 1966
Journal Article
The Journal of staff development, ISSN 0276-928X, 12/2016, Volume 37, Issue 6, p. 63
Journal Article