Ayaz et al., 2025 - Google Patents
Evaluation of Effective Password Generation Processes in Terms of Cyber SecurityAyaz et al., 2025
View PDF- Document ID
- 4619005009104711917
- Author
- Ayaz Ä
- Gündüz M
- Publication year
- Publication venue
- Bitlis Eren Üniversitesi Fen Bilimleri Dergisi
External Links
Snippet
The increasing frequency and sophistication of cyber-attacks have underscored the critical importance of strong, secure passwords in protecting digital identities. This study evaluates the effectiveness of password generation processes within the context of cyber security …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Katsini et al. | Security and usability in knowledge-based user authentication: A review | |
| Zhang-Kennedy et al. | Revisiting password rules: facilitating human management of passwords | |
| Chanda | Password security: an analysis of password strengths and vulnerabilities | |
| Tatlı | Cracking more password hashes with patterns | |
| US20090276839A1 (en) | Identity collection, verification and security access control system | |
| Sadat et al. | Highly secure and easy to remember password-based authentication approach | |
| Chowdhury | Analyzing password strength: A combinatorial entropy approach | |
| Zhao et al. | Explicit authentication response considered harmful | |
| Gabor et al. | Security issues related to e-learning education | |
| CN101964792B (en) | Multimode mapping based strong authentication method | |
| Kumar et al. | An efficient security model for password generation and time complexity analysis for cracking the password | |
| Alhamed et al. | VowPass: Novel method to generate secure and memorable passwords | |
| Di Campi | Password guessing: learn the nature of passwords by studying the human behavior | |
| Clark et al. | Passwords and Cryptwords: The Final Limits on Lengths | |
| Ayaz et al. | Evaluation of Effective Password Generation Processes in Terms of Cyber Security | |
| van Oorschot | User authentication—passwords, biometrics and alternatives | |
| Boonkrong | Security of passwords | |
| LIM | Multi-grid background Pass-Go | |
| Holt | Increasing real-world security of user IDs and passwords | |
| Khanna | Authentication in Cybersecurity | |
| Cisar et al. | Password-a form of authentication | |
| Mohammed | Protecting Cloud Service Providers Based on an Efficient Password-based Authentication System | |
| Madero | Password secured systems and negative authentication | |
| Rashidi et al. | Open sesame: Lessons in password-based user authentication | |
| Egwuche et al. | Assessing the Vulnerabilities of Internet Users to Cyber-Attacks using their Password Login Patterns |