Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords.
Richard BenoRon PoetPublished in: SIN (2020)
Keyphrases
- user authentication
- authentication systems
- graphical passwords
- information security
- graphical password
- security analysis
- biometric recognition
- intelligence and security informatics
- penetration testing
- keystroke dynamics
- biometric authentication
- security threats
- biometric systems
- optimal policy
- authentication protocol
- neural network
- hash functions
- smart card