Search
Now showing items 1-5 of 5
An investigation of semantic patterns in passwords
(2013-08-01)
The advent of large password leaks in recent years has exposed the
security problems of passwords and enabled deeper empirical investigation
of password patterns. Researchers have only touched the surface
of patterns in ...
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
(2013-03-01)
The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ...
Towards secure and privacy preserving e-health data exchanges through consent based access control
(2017-09-01)
How we administer healthcare continues to evolve alongside the advancement of information technology. As we become more connected, the Internet of Things and our want to share information in a timely manner encourage us ...
Strategies and applications for creating more memorable passwords
(2016-01-01)
As we continue to learn and grow in an ever evolving technological age, we deepen our
understanding of the importance of authentication. There are many different types of
authentication, each exhibiting their own strengths ...
Virtual machine detection through Central Processing Unit (CPU) detail anomalies
(2022-12-01)
Malware analysts commonly use virtual machines to provide safe environments to study malware. Malware authors in response, include virtual machine detection functions in their malware so it changes its behavior should a ...