On The Security Evaluation of Partial Password Implementations.
Theodosis MourouzisMarcin WójcikNikos KomninosPublished in: CoRR (2017)
Keyphrases
- information security
- user authentication
- authentication mechanism
- intrusion detection
- evaluation criteria
- high security
- evaluation method
- security issues
- authentication systems
- security management
- security problems
- security analysis
- functional requirements
- data sets
- security policies
- network security
- access control
- low cost