Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








32,862 Hits in 3.4 sec

On the Security of Password Manager Database Formats [chapter]

Paolo Gasti, Kasper B. Rasmussen
2012 Lecture Notes in Computer Science  
This paper presents the first rigorous analysis of storage formats used by popular password managers.  ...  Our analysis shows that most password manager database formats are broken even against weak adversaries.  ...  In the rest of this paper focus solely on database formats and the security they provide, rather than on each password manager implementation.  ... 
doi:10.1007/978-3-642-33167-1_44 fatcat:j73lz2zj2fe5rpl4luh5azfj5y

Forensically-Sound Analysis of Security Risks of Using Local Password Managers

Joshua Gray, Virginia N. L. Franqueira, Yijun Yu
2016 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)  
Previous security risk analyses have focused primarily on cloud-and browser-based password managers, whilst the security risks of local password managers were left under-explored.  ...  Offering features such as creating strong passwords, managing increasing number of complex passwords, and auto-filling of passwords for variable contexts, their security is as critical as the assets being  ...  RELATED WORK Previous work on the security of password managers uncovered security vulnerabilities by studying the susceptibility of password managers to theoretically or simulated attacks.  ... 
doi:10.1109/rew.2016.034 dblp:conf/re/GrayFY16 fatcat:hhnllkgnlne3zkijjxstcqi6ca

Secure Password Sharing and Storage using Encryption and Key-Exchange

Joseph Okwedo Mwamba, Andrew Mwaura Kahonge
2021 International Journal of Computer Applications  
security experts recommend using password management applications to mitigate security vulnerabilities resulting from the transmission of passwords from one person to another.  ...  On the contrary, there have been researched studies revealing vulnerabilities in password management applications.  ...  Dashlane password manager & security architecture The password management application has a security premise similar to that of LastPass.  ... 
doi:10.5120/ijca2021921733 fatcat:47hhwb5kdvfnnbboqyowslzayu

Graphical Password Authentication using image Segmentation for Web Based Applications

Maw Maw Naing, Ohnmar Win
2019 Zenodo  
However, it can either be long and secure or short and hard to remember. A graphical based password is one promising alternatives of textual passwords.  ...  One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts.  ...  The author would also thank to all teachers and friends who willingly helped the author throughout the preparation of the paper.  ... 
doi:10.5281/zenodo.3591235 fatcat:4bnu2r7t65gufillc5tbdghque

A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution [chapter]

Syed S. Rizvi, Aasia Riasat, Mustafa A. Khan, Khaled M. Elleithy
2009 Novel Algorithms and Techniques in Telecommunications and Networking  
The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application.  ...  The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database.  ...  On the same page student can change his password or secret question and answer any time. Passwords and secret questions and answers are stored in the encrypted format in the database and hence. V.  ... 
doi:10.1007/978-90-481-3662-9_50 dblp:conf/cisse/RizviRKE08 fatcat:cfibzfgmybhfdg7v7btjp4su3u

Security Survey of Internet Browsers Data Managers [article]

Catalin Boja
2011 arXiv   pre-print
The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored.  ...  Data recorded during different browsing sessions and by different password management functions it is considered sensitive data.  ...  Acknowledgements The research leading to this paper has been supported by The European Social Fund through Sectored Operational Programmer  ... 
arXiv:1112.5760v1 fatcat:drxrefhpt5fjtdizridih2ag4u

FERNET System

Neethu John, Ankitha Philip
2021 Zenodo  
Abstract: In this paper, there is a brief description of the Fernet key encryption, here the information we can secure using Fernet System.  ...  There is a package in fernet that helps to encrypt and decrypt the whole data, and for the generation of the key, the Fernet system has different types of inbuilt functions.  ...  Fernet is used to improve the efficiency of database access. Extensive research has been conducted on passwords, password security, authentication methods, and options other than passwords.  ... 
doi:10.5281/zenodo.5090539 fatcat:7xdjpkrw7vf5dnlw32gahilopu

No SQL, No Injection? Examining NoSQL Security [article]

Aviv Ron, Alexandra Shulman-Peleg, Emanuel Bronshtein
2015 arXiv   pre-print
For example the emergence of new query formats makes the old SQL injection techniques irrelevant, but are NoSQL databases immune to injection in general? The answer is NO.  ...  This paper examines the maturity of security measures for NoSQL databases, addressing their new query and access mechanisms.  ...  INTRODUCTION Database security has been and will continue to be one of the more critical aspects of information security.  ... 
arXiv:1506.04082v1 fatcat:lyf6ha5mhfecvcerwc4ungqy24

SECURE3 AUTHENTICATION FOR SENSITIVE DATA ON CLOUD USING TEXTUAL, CHESSBOARD AND QR CODE PASSWORD SYSTEM

V. R. Waghmare .
2015 International Journal of Research in Engineering and Technology  
However, the existing cloud sensitive file upload and download on cloud was exposed to the danger of hacking.  ...  Seeing that most of examples which happened in the file uploading and downloading were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more  ...  ChessBoard password is stored matrix format in a database. Source and destination point of a object is selected as a password of one moving object. Same as a second moving object.  ... 
doi:10.15623/ijret.2015.0405093 fatcat:hmzul6wk65apxnce6z5jo6pg34

Web based security with LOPass user authentication protocol in mobile application

Ashish T. Bhole, Sheetal Chaudhari
2013 2013 IEEE International Conference on Computational Intelligence and Computing Research  
But now a day's accessing the internet is faced with many challenges. One of the most popular challenges is to ensure security with vital role to provide security in websites.  ...  The user needs remember only his long term password which has been stored in database very secretly and securely.  ...  Last but not the least, we would also like to thank to our friends for listening to our ideas, asking questions and providing feedback and suggestions for improving our ideas.  ... 
doi:10.1109/iccic.2013.6724167 fatcat:fkpdnug32rcgfb5z4khgcuwkba

Combining Private And Public Key Encryption Techniques For Providing Extreme Secure Environment For An Academic Institution Application

Syed S. Rizvi, Aasia Riasat, Khaled M. Elleithy
2010 Zenodo  
The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application.  ...  The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database.  ...  Our another important concern during the preliminary design of secure application is whether to store the password in some hash format or storing it in the plain text format as the user entered.  ... 
doi:10.5281/zenodo.1284824 fatcat:m2cmkrhuybcnxc2lixc5mffpm4

Passwords Management System using Blowfish Cryptographic Algorithm with Cipher Block Chaining Mode

Ashish.T. Bhole, Savita D. Patil
2012 International Journal of Applied Information Systems  
Everyone has the security problem of private information and increase in demand of Internet use, creates security problems which results in loss of internet users passwords.  ...  Implemented system deals with everything from the simple storage of user name and passwords to the management of password access across many users.  ...  Password Management System (PMS) is due to manage a variety of username and password info on Internet, which is stored in the disk file (called password database) in the form of ciphertext.  ... 
doi:10.5120/ijais12-450226 fatcat:z3l5phfyhnh2za5zd7ree25gi4

Password Security - When Passwords are there for the World to see

Eleanore Young
2017 Zenodo  
The year 2016 has seen many reveals of successful attacks on user account databases; the most notable cases being the attacks on Yahoo [1] and Dropbox [2].  ...  We will explore the setup of the appropriate hardware, common strategies used for cracking passwords, and how to make it harder for attackers to determine your passwords.  ...  Introduction The year 2016 has seen many reveals of successful attacks on user account databases; the most notable cases being the attacks on Yahoo [1] and Dropbox [2] .  ... 
doi:10.5281/zenodo.3521763 fatcat:sdhvnuhqgnempopvc6ufoaqxy4

Security Design and Implementation of the Cloud-based Online System

Wei Chen, Yuting Shang
2016 DEStech Transactions on Computer Science and Engineering  
This paper discusses safety analysis and design based on the online system of the cloud computing, to enhance system security from the deployment of HTTP endpoint security, database key and certificate  ...  According to the performance of the system, the results were satisfactory, the evaluation from the user is high, also served as an example of the similar online system designed to promote safety.  ...  Using the key or password of the database owner can guarantee the security of the private key for the database.  ... 
doi:10.12783/dtcse/icte2016/4817 fatcat:s4yh7urtz5a4fa3xwdicsznecy

A Study for an Ideal Password Management System

Shivam K. Shinde
2022 International Journal for Research in Applied Science and Engineering Technology  
In this study, We're analyzing various previous studies regarding the effectiveness, usability, and security of password managers of all categories.  ...  But the demand for total randomness and exclusivity of passwords is impractical in day-to-day life. Each component of a password management system comes with its cognitive burden on a user.  ...  The significance of these password generator functions in terms of maximizing the security of their passwords and so assisting them in remaining secure on the internet by generating 'lengthy and complicated  ... 
doi:10.22214/ijraset.2022.39970 fatcat:t2vgsrj4bbc5naelf6vfivhdi4
« Previous Showing results 1 — 15 out of 32,862 results