Keywords: کلمه عبور; Group communications; Password; Authenticated key exchange; Compiler;
مقالات ISI کلمه عبور (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: کلمه عبور; Secret key; Password; Mobile devices; Physical layer; Higher layers; Internet of Things; Fog computing;
Keywords: کلمه عبور; Smartcard; Password; Security; Authentication; Multi-server; Biometric; ProVerif;
Keywords: کلمه عبور; Authentication; Password; Smart card; Dynamic ID; Security protocol; Network communication;
Keywords: کلمه عبور; TMIS; Authentication; Biometric; Password; Smart Card; Security; Attack;
Keywords: کلمه عبور; Access right; Embedded system; Password; Protection; Revocation
Keywords: کلمه عبور; Access right; Distribution; Key; Password; Revocation
Keywords: کلمه عبور; Password; Authentication; Key agreement protocol; Chaotic map; Network security
Keywords: کلمه عبور; Remote user authentication; Password; User anonymity; Security
Keywords: کلمه عبور; Chaotic map; Smartcard; Password; Hash function; Session key; Key exchange protocol
Keywords: کلمه عبور; Remote user authentication; Password; Smart cards; Security; Hash function
Evil twins and WPA2 Enterprise: A coming security disaster?
Keywords: کلمه عبور; Authentication; Wifi; Smartphone; Hacking; Password;
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations
Keywords: کلمه عبور; Authentication; Password; Inversion attack; Honeyword; Modified-UI; Paired distance;
A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system
Keywords: کلمه عبور; Cryptanalysis; Integrated EPR information system; Dynamic group; Password; Authentication; Security
Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system
Keywords: کلمه عبور; EPR information system; Two-factor user authentication; Password; Healthcare; Smartcard; Anonymity
Hierarchy of users׳ web passwords: Perceptions, practices and susceptibilities
Keywords: کلمه عبور; Security; Usability; Password; Survey;
Verifier-based computation-and communication-efficient 3EKE protocols
Keywords: کلمه عبور; Security; Authentication; Key agreement; Password; Diffie-Hellman;
Provably secure three party encrypted key exchange scheme with explicit authentication
Keywords: کلمه عبور; 3PEKE; Password; Off-line guessing attack; Provably secure
Constrained temporal structure for text-dependent speaker verification
Keywords: کلمه عبور; Speaker recognition; Text-dependent; Password; Embedded application
Coding behavior of authentication code on the internet
Keywords: کلمه عبور; Authentication code; Coding behavior; Password; Account; Focus group
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
Keywords: کلمه عبور; Authentication; Dynamic ID; Smart card; Password; Multi-server environments
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
Keywords: کلمه عبور; Authentication; Key exchange; Password; Smart card; One-time; Two-factor
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
Keywords: کلمه عبور; Authentication; Dynamic identity; Smart card; Password; Multi-server architecture
PIN selection policies: Are they really effective?
Keywords: کلمه عبور; PIN selection policy; PIN distribution; Entropy; Memorability; Password
Dynamic ID-based remote user password authentication schemes using smart cards: A review
Keywords: کلمه عبور; Password; Authentication; Smart card; Dynamic ID-based; Security
Rational security: Modelling everyday password use
Keywords: کلمه عبور; Password; Security; Task modelling; Rationality
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Keywords: کلمه عبور; Authentication; Cryptography; Password; Impersonation attack; Parallel session attack
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
Keywords: کلمه عبور; Authentication; Security; Smart card; Cryptanalysis; Password
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
Keywords: کلمه عبور; Authentication; Smart cards; Dynamic ID; Multi-server system; Password
A communication-efficient three-party password authenticated key exchange protocol
Keywords: کلمه عبور; Authentication; Cryptography; Key exchange; Password; Provably secure
A secure dynamic identity based authentication protocol for multi-server architecture
Keywords: کلمه عبور; Authentication protocol; Smart card; Dynamic identity; Password; Multi-server architecture
Factors affecting perception of information security and their impacts on IT adoption and security practices
Keywords: کلمه عبور; Perception; Information security; IT adoption; Security practices; e-Banking; Password
Advanced smart card based password authentication protocol
Keywords: کلمه عبور; Remote access control; Smart card; Authentication; Password
Universal cycles of classes of restricted words
Keywords: کلمه عبور; Universal cycle; De Bruijn digraph; Graph connectedness; Equitable word; Ordered Bell number; Password
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Keywords: کلمه عبور; Authenticated key exchange; Password; Secure token; Identity protection
Security flaw of Hölbl et al.’s protocol
Keywords: کلمه عبور; Authentication; Hash; Cryptanalysis; Password
A forward-secure e-mail protocol without certificated public keys
Keywords: کلمه عبور; E-mail; Password; Forward secrecy; Diffie–Hellman key exchange; Mobile network
An improved bilinear pairing based remote user authentication scheme
Keywords: کلمه عبور; Authentication; Bilinear pairings; Smart Card; Password; Timestamp
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
Keywords: کلمه عبور; Authentication; Password; Reparability; Smart card; Verification table
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
Keywords: کلمه عبور; Authentication; Dynamic ID; Multi-server; Mutual authentication; Password; Smart card
A remote user authentication scheme without using smart cards
Keywords: کلمه عبور; Cryptography; User authentication; Password; Smart card
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
Keywords: کلمه عبور; Authentication; Three-party encrypted key exchange; Password guessing attack; Password
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
Keywords: کلمه عبور; Security; Password; On-line services; User ID; ATM machines
A new method for using hash functions to solve remote user authentication
Keywords: کلمه عبور; User authentication; Password; Hash function; Cryptography; Mutual authentication
Three weaknesses in a simple three-party key exchange protocol
Keywords: کلمه عبور; Authenticated key exchange; Impersonation attack; Man-in-the-middle attack; Password; Provable security
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Keywords: کلمه عبور; Authentication; Smart card; Session key; Password
An efficient and complete remote user authentication scheme using smart cards
Keywords: کلمه عبور; Password; Authentication; Security; Session key; Smart card
A novel remote user authentication scheme using bilinear pairings
Keywords: کلمه عبور; Authentication; Bilinear pairings; Smart card; Password; Timestamp
Secure remote user access over insecure networks
Keywords: کلمه عبور; authentication; hash; network; password; security; user; vulnerability
An analysis of BioHashing and its variants
Keywords: کلمه عبور; BioHashing; FaceHashing; PalmHashing; Biometrics; Verification; Security; User identity; Password