Browsing Master Theses & Projects by Author "Vargas Martin, Miguel"
Now showing items 1-8 of 8
-
Assessing the memorability of familiar vocabulary for system assigned passphrases
Jagadeesh, Noopa (2021-08-01)Text-based secrets are still the most commonly used authentication mechanism in information systems. Initially introduced as more secure authentication keys that people could recall, passphrases are tokens consisting of ... -
Cluster techniques and prediction models for a digital media learning environment
Fernandez Espinosa, Arturo (2012-08-01)The present work applies well-known data mining techniques in a digital learning media environment in order to identify groups of students based on their pro le. We generate identi able clusters where some interesting ... -
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
Garcia, Ricardo Rodriguez (2013-03-01)The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ... -
Do extroverts create stronger passwords?
Maraj, Amit (2018-04-01)We investigate the relationship between personality types and the strength of created and selected passwords. For this purpose, we conducted an experiment on Amazon’s Mechanical Turk, with 510 participants. Participants ... -
Hamming distance as a metric for the detection of side channel in 802.11 wireless communications
Chea, Visal (2015-04-01)A wireless network can be exploited in many ways. One way is through intentionally corrupting the Frame Check Sequence (FCS) field by using a different Cyclic Redundancy Check (CRC) polynomial in order to create a side ... -
Raising the bar for password crackers: improving the quality of honeywords with deep neural networks
Yu, Fangyi (2022-12-01)Honeywords are fictitious passwords inserted into databases in order to identify password breaches. Producing honeywords that are difficult to distinguish from actual passwords automatically is a time-consuming and ... -
SegmentPerturb: effective black-box hidden voice attack on commercial ASR systems via selective deletion
Wang, Ganyu (2021-08-01)Voice control systems continue becoming more pervasive as they are deployed in mobile phones, smart home devices, automobiles, etc. Commonly, voice control systems have high privileges on the device, such as making a call ... -
Using consumer-grade brain-computer interface devices to capture and detect unaware facial recognitions
Bellman, Christopher (2017-08-01)The brain's natural reaction to viewing and processing faces in an aware manner is an area of research that has been explored for previously, however the brain's unaware reactions to these stimuli prove to be fairly less ...