Password security, additional account protection methods
Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
Подобные документы
The study of the problems and solutions of insufficient quantity and quality of documentation that is created for software in recent decades. Create a discussion of current practices documentation to facilitate a detailed discussion in the future.
статья, добавлен 23.02.2016Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
книга, добавлен 08.03.2014Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
статья, добавлен 27.05.2021Analysis of existing methods and means of remote work with breadboard Arduino. The advantages of the Tinkercad Internet service in comparison with other tools of remote work. The service capability for microprocessor systems design has been considered.
статья, добавлен 23.07.2023Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
курс лекций, добавлен 08.03.2014The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
книга, добавлен 08.03.2014Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
учебное пособие, добавлен 15.09.2012Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
статья, добавлен 06.05.2018The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.
монография, добавлен 08.03.2014Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
учебное пособие, добавлен 08.03.2014Show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. The strategy – a general outline. Polynomial construction.
курс лекций, добавлен 08.03.2014Fair Blind Signatures without Random Oracles. Fair Partially Blind Signatures. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Side-Channel, Fault Attacks.
книга, добавлен 08.03.2014Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.
реферат, добавлен 05.01.2014The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.
презентация, добавлен 28.12.2013Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.
статья, добавлен 23.02.2016The problem of the development of mathematical support to automate the process of diagnostic and recognizing model construction by precedents. The software realizing proposed transformations and indicators characterizing their properties was developed.
статья, добавлен 29.07.2016Обзор протокола Multi-Touch технологий передачи данных. Анализ и сравнение версий протокола Multi-Touch технологий передачи данных. Требования к разрабатываемой системе. Методы разработки программного комплекса. Программное обеспечение для Multi-Touch.
курсовая работа, добавлен 01.10.2016Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.
научная работа, добавлен 15.09.2012Разновидности блоков Java-программы: классы, методы (methods), переменные (variables) и пакеты (package). Стандартные переменные, встроенные в язык типы для представления численных значений, одиночных символов и булевских (двоичных, логических) значений.
реферат, добавлен 28.05.2018Тhe main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.
статья, добавлен 09.10.2018The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.
презентация, добавлен 28.12.2013Finding Small Solutions to Univariate and Bivariate Polynomial Congruences. The RSA Public Key Cryptosystem. Coppersmith Attack on Short Random Pads. Cryptanalysis via the Defining Equation. The Lattice Factoring Method. Improved Determinant Bounds.
диссертация, добавлен 08.03.2014