Search results for "Security"

showing 10 items of 1693 documents

Too many passwords? How understanding our memory can increase password memorability

2018

Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …

Software_OPERATINGSYSTEMSinformation securityComputer scienceInternet privacymetamemoryHuman Factors and ErgonomicsContext (language use)02 engineering and technologyEducationPassword strength020204 information systems0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencestietoturvaPassword psychology050107 human factorsmuisti (kognitio)human memoryta113PasswordAuthenticationmemorabilityCognitive passwordbusiness.industry05 social sciencesGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securitytodentaminenHardware and ArchitectureauthenticationbusinessSoftwareInternational Journal of Human-Computer Studies
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct

Improving the security of multiple passwords through a greater understanding of the human memory

2016

Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…

Software_OPERATINGSYSTEMSrepetitionkäytettävyysuser memorypassword memorabilitymuistiteoriatmetamemoryinterferencepassword reuseunohtaminenmuistisalasanatunique passwordsComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSmetamuistipassword securityuser conveniencemuistaminentietoturvamemory theories
researchProduct

Connecting the public with soil to improve human health

2019

Despite the definite links between soil and human health, it is likely that most people do not think about soil when considering human health. There is a disconnect between most people in our modern society and soil, and when people notice soil it is often in a negative context. People care for things that matter to them, and creating a more positive public image of soil could improve human health by leading to better treatment and understanding of the soil resource. There are a number of concepts that may be able to connect people to the soil, including terroir, soil health and soil security. While terroir originally established a connection between those who appreciate wine and the soils …

Soil healtheducation.field_of_studyResource (biology)PopulationSoil ScienceContext (language use)04 agricultural and veterinary sciences010501 environmental sciences01 natural sciencesSocial marketingEcosystem servicesWater security040103 agronomy & agriculture0401 agriculture forestry and fisheriesBusinesseducationEnvironmental planning0105 earth and related environmental sciencesTerroirEuropean Journal of Soil Science
researchProduct

Environmental, Agricultural, and Socioeconomic Impacts of Salinization to Family-Based Irrigated Agriculture in the Brazilian Semiarid Region

2020

Soil salinity is one of the major abiotic factors causing a serious threat to global food security, mainly in arid and semiarid regions. Salinity brings socioeconomic impacts associated with low crop productivity and devaluation of agricultural lands. In this chapter, we approach agricultural, environmental, and socioeconomic impacts of soil salinization. We also report two case studies from irrigated areas of the Brazilian semiarid, where previously cultivated lands were abandoned due to increased soil salinity. A survey of the published literature showed that soil salinity became a global problem that is accelerated by human activities such as deforestation and lack of irrigation manageme…

Soil managementGeographyFood securitySoil salinityAgriculturebusiness.industryDeforestationAgroforestryCrop yieldIrrigation managementbusinessArid
researchProduct

The Old Guard Under a New Order: K. O. Friedrichs Meets Felix Klein

2018

Constance Reid’s recent tribute to K. O. Friedrichs (Reid 1983) undoubtedly brought back fond memories to those who knew the man and his many achievements (see also Reid 1986). It was a great pleasure for me to interview Friedrichs in January 1982, only about a year before his death. He was already in very delicate health. His wife Nellie (see Biegel 2012) was kind enough to arrange the interview, but warned me beforehand that her husband tired rather easily and was somewhat hard of hearing. Nevertheless, he was extremely forthcoming in discussing his early career with me, and quick to dismiss some of my faulty misconceptions regarding Gottingen mathematics in the 1920s, which was the main …

Somewhat hardGuard (information security)Psychoanalysismedia_common.quotation_subjectWifeTributeConversationEarly careerOrder (virtue)media_commonPleasure
researchProduct

Spatial [Elements] Decision Support System Used in Disaster Management

2007

Natural disasters profoundly affect the development of human society, they are the most pervasive disasters in the world and they cause the greatest property and human loss. Considering the natural disasters that have struck Romania these years, we believe that is it is absolutely necessary to develop a spatial [elements] decision support system, which would prevent - as much as possible - natural disasters from occurring or would help mitigate their effects. All these objectives are unattainable without effectively applying information and communication technology in the field of natural disasters.

Spatial decision support systemDecision support systemGeographic information systemEmergency managementbusiness.industryComputer securitycomputer.software_genreRisk analysis (engineering)Information and Communications TechnologyNatural disasterbusinesscomputerHuman societyComputingMilieux_MISCELLANEOUS2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference
researchProduct

Circuits and excitations to enable Brownian token-based computing with skyrmions

2021

Brownian computing exploits thermal motion of discrete signal carriers (tokens) for computations. In this paper we address two major challenges that hinder competitive realizations of circuits and application of Brownian token-based computing in actual devices for instance based on magnetic skyrmions. To overcome the problem that crossings generate for the fabrication of circuits, we design a crossing-free layout for a composite half-adder module. This layout greatly simplifies experimental implementations as wire crossings are effectively avoided. Additionally, our design is shorter to speed up computations compared to conventional designs. To address the key issue of slow computation base…

SpeedupCondensed Matter - Mesoscale and Nanoscale PhysicsPhysics and Astronomy (miscellaneous)Computer science530 PhysicsComputationFOS: Physical sciencesTopologySecurity token530 PhysikPower (physics)Discrete-time signalMesoscale and Nanoscale Physics (cond-mat.mes-hall)TorqueBrownian motionElectronic circuit
researchProduct

Rakstu lasīšanas sociālais portāls

2018

Spring boot, Angular, JWT, Spring boot data, Spring boot security, Spring boot web

Spring boot securityDatorzinātneAngularSpring bootJWTSpring boot data
researchProduct

VLPZ: The Vehicular Location Privacy Zone

2016

International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…

StandardizationComputer scienceWireless ad hoc networkSecurity.02 engineering and technologyPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringVANETsGeneral Environmental ScienceLocation privacybiologybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunicationsPseudonym ChangingTollMetric (mathematics)biology.proteinKey (cryptography)SecurityGeneral Earth and Planetary SciencesComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerAnonymityComputer network
researchProduct