Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role

TT Ting, KM Cheah, JX Khiew, YC Lee… - International Journal of …, 2024 - ijirss.com
Cyber-attacks and crimes are still a problem in Malaysia. COVID-19 has pushed Malaysians
into the digital world more quickly. These cyberattacks may rise and affect more people …

[HTML][HTML] Cybersecurity insights gleaned from world religions

K Renaud, M Dupuis - Computers & Security, 2023 - Elsevier
Organisations craft and disseminate security policies, encoding the actions they want
employees to take to preserve and protect organisational information resources. They …

Privacy-preserving compromised credential checking protocol for account protection

X Yu, D Tang, Z Zhao, W Zhao - Computer Standards & Interfaces, 2024 - Elsevier
Hundreds of millions of accounts are sold on the Dark Web as a result of hacking. These
stolen accounts can be used to maliciously log into the victim's application, which is also …

Comparative survey on single password authentication techniques

C Doğanay, A Küpçü - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Passwords are the most common way of authentication. Generally, people tend to use the
same password for numerous online servers. However, passwords have various …

Developing a passwordgenerating software: Regarding password memorability and security

A Mogaddam, K Muhammad - 2022 - diva-portal.org
With the growth of digital information and technology, more websites require user
authentication to access individuals' sensitive information. The main form of authentication …

[PDF][PDF] LÁMÁNÍ HESEL POMOCÍ ALGORITMU PRINCE V SYS-TÉMU FITCRACK

PBD BOLVANSKÝ, R HRANICKÝ - itspy.cz
Algoritmus PRINCE je rýchlejšou a pokročilejšou verziou kombinačného útoku.
Nedistribuované lámanie hesiel často naráža na svoje limity a jeho použiteľnosť na reálne …