[go: up one dir, main page]

Ayaz et al., 2025 - Google Patents

Evaluation of Effective Password Generation Processes in Terms of Cyber Security

Ayaz et al., 2025

View PDF
Document ID
4619005009104711917
Author
Ayaz Ä
Gündüz M
Publication year
Publication venue
Bitlis Eren Üniversitesi Fen Bilimleri Dergisi

External Links

Snippet

The increasing frequency and sophistication of cyber-attacks have underscored the critical importance of strong, secure passwords in protecting digital identities. This study evaluates the effectiveness of password generation processes within the context of cyber security …
Continue reading at dergipark.org.tr (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Katsini et al. Security and usability in knowledge-based user authentication: A review
Zhang-Kennedy et al. Revisiting password rules: facilitating human management of passwords
Chanda Password security: an analysis of password strengths and vulnerabilities
Tatlı Cracking more password hashes with patterns
US20090276839A1 (en) Identity collection, verification and security access control system
Sadat et al. Highly secure and easy to remember password-based authentication approach
Chowdhury Analyzing password strength: A combinatorial entropy approach
Zhao et al. Explicit authentication response considered harmful
Gabor et al. Security issues related to e-learning education
CN101964792B (en) Multimode mapping based strong authentication method
Kumar et al. An efficient security model for password generation and time complexity analysis for cracking the password
Alhamed et al. VowPass: Novel method to generate secure and memorable passwords
Di Campi Password guessing: learn the nature of passwords by studying the human behavior
Clark et al. Passwords and Cryptwords: The Final Limits on Lengths
Ayaz et al. Evaluation of Effective Password Generation Processes in Terms of Cyber Security
van Oorschot User authentication—passwords, biometrics and alternatives
Boonkrong Security of passwords
LIM Multi-grid background Pass-Go
Holt Increasing real-world security of user IDs and passwords
Khanna Authentication in Cybersecurity
Cisar et al. Password-a form of authentication
Mohammed Protecting Cloud Service Providers Based on an Efficient Password-based Authentication System
Madero Password secured systems and negative authentication
Rashidi et al. Open sesame: Lessons in password-based user authentication
Egwuche et al. Assessing the Vulnerabilities of Internet Users to Cyber-Attacks using their Password Login Patterns