Login / Signup
The Ginger: Another Spice to Hinder Attacks on Password Files.
Francesco Buccafurri
Vincenzo De Angelis
Sara Lazzaro
Published in:
WEBIST (2022)
Keyphrases
</>
countermeasures
information security
detecting malicious
malicious users
databases
malicious attacks
software process
traffic analysis
terrorist attacks
metadata
computer security
security protocols
database
security threats
security risks
software development
java card
case study
authentication systems