Using Chinese Characters To Generate Text-Based Passwords For Information Security.
Bing YaoYarong MuYirong SunHui SunXiaohui ZhangHongyu WangJing SuMingjun ZhangSihua YangMeimei ZhaoXiaomin WangFei MaMing YaoChao YangJianming XiePublished in: CoRR (2019)
Keyphrases
- information security
- chinese characters
- chinese character recognition
- countermeasures
- security issues
- information systems
- smart card
- hand written
- character recognition
- network security
- intrusion detection
- computer security
- information assurance
- security level
- security requirements
- e government
- user authentication
- risk assessment
- information security management
- smart grid
- iso iec
- machine learning
- technical issues
- sensitive data
- image processing
- risk analysis
- chinese language
- database
- case study