With the growth of digital information and technology, more websites require user authentication to access individuals' sensitive information. The main form of authentication are passwords which if chosen unwisely can easily be guessed or cracked by someone else. This is why it is important to create safe yet memorable passwords. The goal of this report was to develop a program that is able to detect commonly used patterns within passwords in order to transform a specified user inputted password into a more secure password without sacrificing the memorability of the original input. This was realized by analyzing lists of common passwords and partaking in a literature study within this field to identify the patterns present within those pass...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
Zero-knowledge password policy checks (ZKPPC) were introduced in Kiefer and Manulis’ report from 201...
By leveraging smart-cards as a bearer of user credentials for legacy applications the security of th...
With the growth of digital information and technology, more websites require user authentication to ...
Due to its simplicity and deployability, password authentication is today's most common way of authe...
Passwords are used more now than ever before. Their use is based on the ideathat the password is onl...
Using password hashes for verification is a common way to secure users’ passwords against a potentia...
Detta arbete berör ämnet "tangenttryckningsautentisering" och reder ut vilken typ av lösenord som är...
I dagens samhälle är datorer ett naturligt inslag i vår vardag. För de flesta anses datorn vara ett ...
This thesis examines some of the currently available programs for password guessing, in terms of des...
Passwords are the most commonly used form of authentication. The game based password system is a new...
In 2019 over 60% of Swedish companies had their business processes digitalized, which mean that they...
Syftet med den här studien var att undersöka vilka lösenordsstrategier individer använder sig av vid...
Today, text-based password is one of the most common ways to verify login to a web page and to prote...
Efter regelbundna diskussioner om huruvida autentisering med statiska lösenord är ett bra tillvägagå...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
Zero-knowledge password policy checks (ZKPPC) were introduced in Kiefer and Manulis’ report from 201...
By leveraging smart-cards as a bearer of user credentials for legacy applications the security of th...
With the growth of digital information and technology, more websites require user authentication to ...
Due to its simplicity and deployability, password authentication is today's most common way of authe...
Passwords are used more now than ever before. Their use is based on the ideathat the password is onl...
Using password hashes for verification is a common way to secure users’ passwords against a potentia...
Detta arbete berör ämnet "tangenttryckningsautentisering" och reder ut vilken typ av lösenord som är...
I dagens samhälle är datorer ett naturligt inslag i vår vardag. För de flesta anses datorn vara ett ...
This thesis examines some of the currently available programs for password guessing, in terms of des...
Passwords are the most commonly used form of authentication. The game based password system is a new...
In 2019 over 60% of Swedish companies had their business processes digitalized, which mean that they...
Syftet med den här studien var att undersöka vilka lösenordsstrategier individer använder sig av vid...
Today, text-based password is one of the most common ways to verify login to a web page and to prote...
Efter regelbundna diskussioner om huruvida autentisering med statiska lösenord är ett bra tillvägagå...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
Zero-knowledge password policy checks (ZKPPC) were introduced in Kiefer and Manulis’ report from 201...
By leveraging smart-cards as a bearer of user credentials for legacy applications the security of th...