Concerns and Security for Hashing Passwords.
Jonathan HerreraMd Liakat AliPublished in: UEMCON (2018)
Keyphrases
- information security
- user authentication
- hash functions
- authentication systems
- network security
- sensitive data
- security requirements
- intrusion detection
- security issues
- security policies
- access control
- security level
- security systems
- information assurance
- security measures
- biometric recognition
- security properties
- computer security
- authentication protocol
- security protocols
- security problems
- security threats
- order preserving
- security management
- file organization
- key management
- security mechanisms
- functional requirements