X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (22589) 22589
Journal Article (4087) 4087
Conference Proceeding (2615) 2615
Magazine Article (1255) 1255
Trade Publication Article (1106) 1106
Book Chapter (250) 250
Dissertation (192) 192
Publication (139) 139
Web Resource (138) 138
Book Review (67) 67
Book / eBook (49) 49
Government Document (22) 22
Streaming Video (11) 11
Standard (8) 8
Report (7) 7
Paper (5) 5
Transcript (4) 4
Reference (2) 2
Data Set (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
passwords (27589) 27589
computer security (3030) 3030
authentication (2941) 2941
network security (2047) 2047
password (1737) 1737
social networks (1564) 1564
security (1473) 1473
inventors (1188) 1188
internet (1162) 1162
internet crime (1101) 1101
data encryption (1040) 1040
access control (1018) 1018
biometrics (997) 997
software (936) 936
web sites (917) 917
cryptography (875) 875
servers (817) 817
data integrity (792) 792
computer information security (724) 724
smart cards (716) 716
smartphones (658) 658
privacy (657) 657
patents (623) 623
computer science, information systems (591) 591
security management (591) 591
personal information (543) 543
smart card (542) 542
password authentication (540) 540
hackers (514) 514
electronic mail systems (475) 475
computers (463) 463
computer science (455) 455
telecommunications (433) 433
engineering, electrical & electronic (417) 417
encryption (416) 416
passwort (405) 405
fraud (393) 393
protocols (393) 393
dictionaries (383) 383
safety and security measures (379) 379
data security (374) 374
employees (367) 367
identity theft (367) 367
cryptanalysis (355) 355
methods (346) 346
wireless networks (340) 340
information technology (334) 334
computer viruses (325) 325
protocol (317) 317
algorithms (312) 312
cloud computing (297) 297
user authentication (292) 292
networks (274) 274
authentifizierung (273) 273
data bases (263) 263
malware (261) 261
operating systems (252) 252
computer science, theory & methods (249) 249
databases (246) 246
efficient (245) 245
studies (244) 244
analysis (243) 243
automation (243) 243
computer science, software engineering (235) 235
product introduction (233) 233
authentication protocols (230) 230
information security (226) 226
usability (225) 225
researchers (222) 222
key agreement (219) 219
banks (212) 212
graphical password (210) 210
one-time password (207) 207
electronic commerce (206) 206
computer software industry (202) 202
usage (201) 201
computer science, hardware & architecture (198) 198
computer communication networks (196) 196
customer services (190) 190
internet of things (187) 187
cellular telephones (186) 186
management (184) 184
research (184) 184
consumers (182) 182
credit cards (181) 181
mutual authentication (181) 181
software upgrading (179) 179
conferences (176) 176
computer networks (175) 175
communication (171) 171
scheme (171) 171
electronic mail (170) 170
information systems (168) 168
students (168) 168
phishing (167) 167
mathematical models (164) 164
electronic banking (163) 163
graphical passwords (162) 162
key exchange (162) 162
mobile commerce (160) 160
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (33) 33
Gerstein Science - Stacks (7) 7
UTL at Downsview - May be requested (5) 5
Engineering & Comp. Sci. - Stacks (4) 4
UofT at Mississauga - Stacks (3) 3
Robarts - Stacks (2) 2
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Engineering & Comp. Sci. - May be requested in 6-10 wks (1) 1
Gerstein Science - Circulation Desk (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (31131) 31131
Chinese (323) 323
Japanese (96) 96
Korean (40) 40
Spanish (10) 10
German (9) 9
Portuguese (6) 6
French (5) 5
Lithuanian (4) 4
Hindi (3) 3
Urdu (3) 3
Czech (2) 2
Hungarian (2) 2
Russian (2) 2
Afrikaans (1) 1
Arabic (1) 1
Croatian (1) 1
Indonesian (1) 1
Polish (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Staff Development, ISSN 0276-928X, 12/2016, Volume 37, Issue 6, p. 63
Journal Article
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 173 - 186
Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets,... 
passwords | password security | authentication
Conference Proceeding
International Journal of Human - Computer Studies, ISSN 1071-5819, 2005, Volume 63, Issue 1, pp. 102 - 127
Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a... 
Usable security | Alphanumeric password | PassPoints | Graphical password | Authentication | Password security | PREVIOUSLY ATTENDED OBJECTS | WORDS | RECALL | ERGONOMICS | usable security | COMPUTER SCIENCE, CYBERNETICS | alphanumeric password | PSYCHOLOGY, MULTIDISCIPLINARY | PICTURES | MEMORY | NATURAL SCENES | graphical password | SECURITY | password security | authentication
Journal Article
AIP Conference Proceedings, ISSN 0094-243X, 04/2017, Volume 1830, Issue 1
In this paper, we propose a new password-authentication scheme based on quadratic residue problem with the following advantages: the scheme does not require a... 
Authentication | Passwords
Journal Article
Computers & Security, ISSN 0167-4048, 08/2019, Volume 85, pp. 41 - 50
Usually, strong passwords tend to be hard to memorize, and easy-to-remember passwords tend to be predictable. User-created passwords are memorable but may be... 
Password strength | Password policy | Guessability | Mnemonic password | Password tip | COMPUTER SCIENCE, INFORMATION SYSTEMS | Markov processes | Analysis | Websites | Passwords | Markov chains | Security | Usability | Empirical analysis | Tips
Journal Article
1977, ISBN 9780894330162, viii, 134
Book
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 161 - 172
Graphical passwords were proposed as an alternative to overcome the inherent limitations of text-based passwords, inspired by research that shows that the... 
passwords | android | mobile security
Conference Proceeding
Future Generation Computer Systems, ISSN 0167-739X, 12/2019, Volume 101, pp. 1018 - 1027
With the rapid development of information technology (IT) in financial industry, financial technology (FinTech) has become an emerging area for enterprises and... 
Graphical passwords | Multiple password inference | Security and usability | User authentication | Map passwords | FinTech application
Journal Article
International Journal of Information Security, ISSN 1615-5262, 12/2019, Volume 18, Issue 6, pp. 741 - 759
Journal Article
Proceedings of the 17th ACM conference on computer and communications security, ISSN 1543-7221, 10/2010, pp. 176 - 186
This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely revoking access to an account by... 
user authentication | password expiration | passwords | User authentication | Password expiration | Passwords
Conference Proceeding
IEEE Access, ISSN 2169-3536, 8/2019, Volume 7, pp. 1 - 1
Password-based authentication is the first line of defense of most information systems. Password security concerns the security of the whole information... 
Shape | password generation strategy | password strength | Keyboards | Authentication | Writing | Usability | mnemonic passwords | Password
Journal Article
Book
Book
Computer Communications, ISSN 0140-3664, 2011, Volume 34, Issue 3, pp. 305 - 309
Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an insecure communication channel. Currently, smart... 
Cryptanalysis | Smart card | Security | Authentication | Password | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | PASSWORD AUTHENTICATION | ENGINEERING, ELECTRICAL & ELECTRONIC | Smart cards | Dynamics | Passwords | Computational efficiency | Servers | Computer information security | Servers (computers)
Journal Article
Proceedings of the 17th ACM conference on computer and communications security, ISSN 1543-7221, 10/2010, pp. 162 - 175
In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST SP800-63, as a measurement of the security provided by various... 
password policies | cybercrime | password cracking | Password cracking | Cybercrime | Password policies
Conference Proceeding
International Journal of Human - Computer Studies, ISSN 1071-5819, 10/2019, Volume 130, pp. 1 - 20
Shoulder surfing is an attack vector widely recognized as a real threat - enough to warrant researchers dedicating a considerable effort toward designing novel... 
Textual passwords | Shoulder surfing | Graphical passwords | Vulnerability evaluation | Authentication | Comparative framework | RESISTANT | PSYCHOLOGY, MULTIDISCIPLINARY | GRAPHICAL PASSWORD | ERGONOMICS | COMPUTER SCIENCE, CYBERNETICS | Computer Science - Cryptography and Security
Journal Article
Computers & Security, ISSN 0167-4048, 09/2016, Volume 62, p. 317
  With reference to a protection system featuring active subjects that attempt to access passive, typed objects, we propose a set of mechanisms supporting the... 
Studies | Access control | Passwords
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 11/2017, Volume 12, Issue 11, pp. 2574 - 2589
Textual passwords remain the most commonly employed user authentication mechanism, and potentially will continue to be so for years to come. Despite the... 
Analytical models | password hint | password recall | Memory management | passwords | Authentication | Electronic mail | Servers | Usability | cued recall-based textual passwords | MEMORABILITY | SECURITY | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Access control | Recall | Lists | Computer security | Passwords
Journal Article
International Journal of Human - Computer Studies, ISSN 1071-5819, 08/2019, Volume 128, pp. 61 - 71
Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password... 
User convenience | Password memorability | Password security behavior | Password verification | Password security | Repetition | DESIGN | MANAGEMENT | RECALL | REHEARSAL | ERGONOMICS | COMPUTER SCIENCE, CYBERNETICS | PSYCHOLOGY, MULTIDISCIPLINARY | AUTHENTICATION | MEMORY | SECURITY | FRAMEWORK | INFORMATION-SYSTEMS | DEPTH
Journal Article
Proceedings of the 2017 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2017, pp. 329 - 346
Password checking systems traditionally allow login only if the correct password is submitted. Recent work on typo-tolerant password checking suggests that... 
mturk | password | error-tolerant password checking | password based encryption | user study | typo-tolerant password checking | password authentication | authentication | Usable Security | Typo-Tolerant Password Checking | Error-Tolerant Password Checking | Typo | Authentication | Passwords
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.