Search results for "Security"
showing 10 items of 1693 documents
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Improving the security of multiple passwords through a greater understanding of the human memory
2016
Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…
Connecting the public with soil to improve human health
2019
Despite the definite links between soil and human health, it is likely that most people do not think about soil when considering human health. There is a disconnect between most people in our modern society and soil, and when people notice soil it is often in a negative context. People care for things that matter to them, and creating a more positive public image of soil could improve human health by leading to better treatment and understanding of the soil resource. There are a number of concepts that may be able to connect people to the soil, including terroir, soil health and soil security. While terroir originally established a connection between those who appreciate wine and the soils …
Environmental, Agricultural, and Socioeconomic Impacts of Salinization to Family-Based Irrigated Agriculture in the Brazilian Semiarid Region
2020
Soil salinity is one of the major abiotic factors causing a serious threat to global food security, mainly in arid and semiarid regions. Salinity brings socioeconomic impacts associated with low crop productivity and devaluation of agricultural lands. In this chapter, we approach agricultural, environmental, and socioeconomic impacts of soil salinization. We also report two case studies from irrigated areas of the Brazilian semiarid, where previously cultivated lands were abandoned due to increased soil salinity. A survey of the published literature showed that soil salinity became a global problem that is accelerated by human activities such as deforestation and lack of irrigation manageme…
The Old Guard Under a New Order: K. O. Friedrichs Meets Felix Klein
2018
Constance Reid’s recent tribute to K. O. Friedrichs (Reid 1983) undoubtedly brought back fond memories to those who knew the man and his many achievements (see also Reid 1986). It was a great pleasure for me to interview Friedrichs in January 1982, only about a year before his death. He was already in very delicate health. His wife Nellie (see Biegel 2012) was kind enough to arrange the interview, but warned me beforehand that her husband tired rather easily and was somewhat hard of hearing. Nevertheless, he was extremely forthcoming in discussing his early career with me, and quick to dismiss some of my faulty misconceptions regarding Gottingen mathematics in the 1920s, which was the main …
Spatial [Elements] Decision Support System Used in Disaster Management
2007
Natural disasters profoundly affect the development of human society, they are the most pervasive disasters in the world and they cause the greatest property and human loss. Considering the natural disasters that have struck Romania these years, we believe that is it is absolutely necessary to develop a spatial [elements] decision support system, which would prevent - as much as possible - natural disasters from occurring or would help mitigate their effects. All these objectives are unattainable without effectively applying information and communication technology in the field of natural disasters.
Circuits and excitations to enable Brownian token-based computing with skyrmions
2021
Brownian computing exploits thermal motion of discrete signal carriers (tokens) for computations. In this paper we address two major challenges that hinder competitive realizations of circuits and application of Brownian token-based computing in actual devices for instance based on magnetic skyrmions. To overcome the problem that crossings generate for the fabrication of circuits, we design a crossing-free layout for a composite half-adder module. This layout greatly simplifies experimental implementations as wire crossings are effectively avoided. Additionally, our design is shorter to speed up computations compared to conventional designs. To address the key issue of slow computation base…
Rakstu lasīšanas sociālais portāls
2018
Spring boot, Angular, JWT, Spring boot data, Spring boot security, Spring boot web
VLPZ: The Vehicular Location Privacy Zone
2016
International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…