Search
Now showing items 1-2 of 2
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
(2013-03-01)
The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ...
Strategies and applications for creating more memorable passwords
(2016-01-01)
As we continue to learn and grow in an ever evolving technological age, we deepen our
understanding of the importance of authentication. There are many different types of
authentication, each exhibiting their own strengths ...