Password authentication has become ubiquitous in the cyber age. To-date, there have been several studies on country based passwords by authors who studied, amongst others, English, Finnish, Italian and Chinese based passwords. However, there has been a lack of focused study on the type of passwords that are being created in Africa and whether there are benefits in creating passwords in an African language. For this research, password databases containing LAN Manager (LM) and NT LAN Manager (NTLM) hashes extracted from South African organisations in a variety of sectors in the economy, were obtained to gain an understanding of user behaviour in creating passwords. Analysis of the passwords obtained from these hashes (using several cracking m...
Password-based authentication is perhaps the most widely used method for user authentication. Passwo...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...
While passwords have served the purpose of authentication throughout human history, text passwords h...
Password authentication has become ubiquitous in the cyber age. To-date, there have been several stu...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
The increases in computerized mode of operations and the activities of identity attackers have not o...
CITATION: Butler, R. & Butler, M. 2015. The password practices applied by South African online consu...
The challenge of having to create and remember a secure password for each user account has become a ...
User authentication is a vital element in ensuring the secure operation of computer-based systems. T...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Control mechanisms established on the boundary of an information system are an important preliminary...
As we continue to learn and grow in an ever evolving technological age, we deepen our understanding ...
Computer password use is on the rise. Passwords have become one of the primary authentication method...
In today’s world, taking secret word hash records and cracking the hash passwords has become extreme...
As users of technology in our everyday actions we need to authenticate in different applications, in...
Password-based authentication is perhaps the most widely used method for user authentication. Passwo...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...
While passwords have served the purpose of authentication throughout human history, text passwords h...
Password authentication has become ubiquitous in the cyber age. To-date, there have been several stu...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
The increases in computerized mode of operations and the activities of identity attackers have not o...
CITATION: Butler, R. & Butler, M. 2015. The password practices applied by South African online consu...
The challenge of having to create and remember a secure password for each user account has become a ...
User authentication is a vital element in ensuring the secure operation of computer-based systems. T...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Control mechanisms established on the boundary of an information system are an important preliminary...
As we continue to learn and grow in an ever evolving technological age, we deepen our understanding ...
Computer password use is on the rise. Passwords have become one of the primary authentication method...
In today’s world, taking secret word hash records and cracking the hash passwords has become extreme...
As users of technology in our everyday actions we need to authenticate in different applications, in...
Password-based authentication is perhaps the most widely used method for user authentication. Passwo...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...
While passwords have served the purpose of authentication throughout human history, text passwords h...