A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Security of Password Manager Database Formats
[chapter]
2012
Lecture Notes in Computer Science
This paper presents the first rigorous analysis of storage formats used by popular password managers. ...
Our analysis shows that most password manager database formats are broken even against weak adversaries. ...
In the rest of this paper focus solely on database formats and the security they provide, rather than on each password manager implementation. ...
doi:10.1007/978-3-642-33167-1_44
fatcat:j73lz2zj2fe5rpl4luh5azfj5y
Forensically-Sound Analysis of Security Risks of Using Local Password Managers
2016
2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)
Previous security risk analyses have focused primarily on cloud-and browser-based password managers, whilst the security risks of local password managers were left under-explored. ...
Offering features such as creating strong passwords, managing increasing number of complex passwords, and auto-filling of passwords for variable contexts, their security is as critical as the assets being ...
RELATED WORK Previous work on the security of password managers uncovered security vulnerabilities by studying the susceptibility of password managers to theoretically or simulated attacks. ...
doi:10.1109/rew.2016.034
dblp:conf/re/GrayFY16
fatcat:hhnllkgnlne3zkijjxstcqi6ca
Secure Password Sharing and Storage using Encryption and Key-Exchange
2021
International Journal of Computer Applications
security experts recommend using password management applications to mitigate security vulnerabilities resulting from the transmission of passwords from one person to another. ...
On the contrary, there have been researched studies revealing vulnerabilities in password management applications. ...
Dashlane password manager & security architecture The password management application has a security premise similar to that of LastPass. ...
doi:10.5120/ijca2021921733
fatcat:47hhwb5kdvfnnbboqyowslzayu
Graphical Password Authentication using image Segmentation for Web Based Applications
2019
Zenodo
However, it can either be long and secure or short and hard to remember. A graphical based password is one promising alternatives of textual passwords. ...
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. ...
The author would also thank to all teachers and friends who willingly helped the author throughout the preparation of the paper. ...
doi:10.5281/zenodo.3591235
fatcat:4bnu2r7t65gufillc5tbdghque
A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution
[chapter]
2009
Novel Algorithms and Techniques in Telecommunications and Networking
The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. ...
The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. ...
On the same page student can change his password or secret question and answer any time. Passwords and secret questions and answers are stored in the encrypted format in the database and hence.
V. ...
doi:10.1007/978-90-481-3662-9_50
dblp:conf/cisse/RizviRKE08
fatcat:cfibzfgmybhfdg7v7btjp4su3u
Security Survey of Internet Browsers Data Managers
[article]
2011
arXiv
pre-print
The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. ...
Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. ...
Acknowledgements The research leading to this paper has been supported by The European Social Fund through Sectored Operational Programmer ...
arXiv:1112.5760v1
fatcat:drxrefhpt5fjtdizridih2ag4u
FERNET System
2021
Zenodo
Abstract: In this paper, there is a brief description of the Fernet key encryption, here the information we can secure using Fernet System. ...
There is a package in fernet that helps to encrypt and decrypt the whole data, and for the generation of the key, the Fernet system has different types of inbuilt functions. ...
Fernet is used to improve the efficiency of database access. Extensive research has been conducted on passwords, password security, authentication methods, and options other than passwords. ...
doi:10.5281/zenodo.5090539
fatcat:7xdjpkrw7vf5dnlw32gahilopu
No SQL, No Injection? Examining NoSQL Security
[article]
2015
arXiv
pre-print
For example the emergence of new query formats makes the old SQL injection techniques irrelevant, but are NoSQL databases immune to injection in general? The answer is NO. ...
This paper examines the maturity of security measures for NoSQL databases, addressing their new query and access mechanisms. ...
INTRODUCTION Database security has been and will continue to be one of the more critical aspects of information security. ...
arXiv:1506.04082v1
fatcat:lyf6ha5mhfecvcerwc4ungqy24
SECURE3 AUTHENTICATION FOR SENSITIVE DATA ON CLOUD USING TEXTUAL, CHESSBOARD AND QR CODE PASSWORD SYSTEM
2015
International Journal of Research in Engineering and Technology
However, the existing cloud sensitive file upload and download on cloud was exposed to the danger of hacking. ...
Seeing that most of examples which happened in the file uploading and downloading were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more ...
ChessBoard password is stored matrix format in a database. Source and destination point of a object is selected as a password of one moving object. Same as a second moving object. ...
doi:10.15623/ijret.2015.0405093
fatcat:hmzul6wk65apxnce6z5jo6pg34
Web based security with LOPass user authentication protocol in mobile application
2013
2013 IEEE International Conference on Computational Intelligence and Computing Research
But now a day's accessing the internet is faced with many challenges. One of the most popular challenges is to ensure security with vital role to provide security in websites. ...
The user needs remember only his long term password which has been stored in database very secretly and securely. ...
Last but not the least, we would also like to thank to our friends for listening to our ideas, asking questions and providing feedback and suggestions for improving our ideas. ...
doi:10.1109/iccic.2013.6724167
fatcat:fkpdnug32rcgfb5z4khgcuwkba
Combining Private And Public Key Encryption Techniques For Providing Extreme Secure Environment For An Academic Institution Application
2010
Zenodo
The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. ...
The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. ...
Our another important concern during the preliminary design of secure application is whether to store the password in some hash format or storing it in the plain text format as the user entered. ...
doi:10.5281/zenodo.1284824
fatcat:m2cmkrhuybcnxc2lixc5mffpm4
Passwords Management System using Blowfish Cryptographic Algorithm with Cipher Block Chaining Mode
2012
International Journal of Applied Information Systems
Everyone has the security problem of private information and increase in demand of Internet use, creates security problems which results in loss of internet users passwords. ...
Implemented system deals with everything from the simple storage of user name and passwords to the management of password access across many users. ...
Password Management System (PMS) is due to manage a variety of username and password info on Internet, which is stored in the disk file (called password database) in the form of ciphertext. ...
doi:10.5120/ijais12-450226
fatcat:z3l5phfyhnh2za5zd7ree25gi4
Password Security - When Passwords are there for the World to see
2017
Zenodo
The year 2016 has seen many reveals of successful attacks on user account databases; the most notable cases being the attacks on Yahoo [1] and Dropbox [2]. ...
We will explore the setup of the appropriate hardware, common strategies used for cracking passwords, and how to make it harder for attackers to determine your passwords. ...
Introduction The year 2016 has seen many reveals of successful attacks on user account databases; the most notable cases being the attacks on Yahoo [1] and Dropbox [2] . ...
doi:10.5281/zenodo.3521763
fatcat:sdhvnuhqgnempopvc6ufoaqxy4
Security Design and Implementation of the Cloud-based Online System
2016
DEStech Transactions on Computer Science and Engineering
This paper discusses safety analysis and design based on the online system of the cloud computing, to enhance system security from the deployment of HTTP endpoint security, database key and certificate ...
According to the performance of the system, the results were satisfactory, the evaluation from the user is high, also served as an example of the similar online system designed to promote safety. ...
Using the key or password of the database owner can guarantee the security of the private key for the database. ...
doi:10.12783/dtcse/icte2016/4817
fatcat:s4yh7urtz5a4fa3xwdicsznecy
A Study for an Ideal Password Management System
2022
International Journal for Research in Applied Science and Engineering Technology
In this study, We're analyzing various previous studies regarding the effectiveness, usability, and security of password managers of all categories. ...
But the demand for total randomness and exclusivity of passwords is impractical in day-to-day life. Each component of a password management system comes with its cognitive burden on a user. ...
The significance of these password generator functions in terms of maximizing the security of their passwords and so assisting them in remaining secure on the internet by generating 'lengthy and complicated ...
doi:10.22214/ijraset.2022.39970
fatcat:t2vgsrj4bbc5naelf6vfivhdi4
« Previous
Showing results 1 — 15 out of 32,862 results