Sorry! No results found
Please visit us back tomorrow as we add 10, 000 new research topics everyday!
About 10 results ( 0,38 seconds)
FTP) security extensions. The File Transfer Protocol (FTP) presently delineated in STD 9, RFC 959 and in position on the Internet benefits usernames and passwords passed in clear text to authenticate customers to servers (via the USER and P...
to investigate customer perceptions of usability, convenience and security in two-factor (2-factor) authentication. 2-factor authentication is a security solution requiring the verification of two different modalities of authentication comp...
password authentication scheme in relation to the careless behaviour of users have been highlighted in this project. Moreover, the existing complex and hard-to-implement alternatives will also be discussed in order to cope with them. It hel...
“biometrics” comes from the Greek language and is derived from the words bio (life) and metric (to measure). This paper will refer to biometrics as the technologies used to measure and analyze personal characteristics, both physiological a...
Disseminating Organizational IT Security and Troubleshooting Best Practices User Authentication Policies to Improve the Network’s Security Authentication policy may be defined as a set of instructions which may be applied to the authenticat...
online payement fraud. In the past, e-commerce companies utilized only bank accounts; users specified amounts of money that were then taken from their accounts and converted to digital money. However, one of the latest trends in digital cas...
security in MANET is hard to achieve due to the vulnerability of the link, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. The existing security proposals in ad hoc...