Digital Library
Search: "[ keyword: Password ]" (16)
A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation
Sanghun Kim, Taenam Cho KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 7, pp. 149-156,
Jul.
2020
https://doi.org/10.3745/KTCCS.2020.9.7.149
Keywords: Linux, Ubuntu, Password, Shadow File, Administrator Privilege
https://doi.org/10.3745/KTCCS.2020.9.7.149
Keywords: Linux, Ubuntu, Password, Shadow File, Administrator Privilege
An Effective One - Time Password Algorithm Using Time
Joong Gil Park, Tae Joo Chang, Bong Joo Park, Jae Cheol Ryou The KIPS Transactions:PartC,
Vol. 8, No. 4, pp. 373-378,
Aug.
2001
10.3745/KIPSTC.2001.8.4.373
10.3745/KIPSTC.2001.8.4.373
Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps
Taenam Cho, SookHee Choi KIPS Transactions on Computer and Communication Systems,
Vol. 8, No. 1, pp. 9-16,
Jan.
2019
https://doi.org/10.3745/KTCCS.2019.8.1.9
Keywords: Android, virtual keyboard, Banking App, Security, Password
https://doi.org/10.3745/KTCCS.2019.8.1.9
Keywords: Android, virtual keyboard, Banking App, Security, Password
Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection
Seung Ju Jang KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 3, pp. 97-104,
Mar.
2015
10.3745/KTCCS.2015.4.3.97
10.3745/KTCCS.2015.4.3.97
Security Analysis on Password Authentication System of Web Sites
Hee Kyeong Noh , Chang Kuk Choi , Min Su Park , Seung Joo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 12, pp. 463-478,
Dec.
2014
10.3745/KTCCS.2014.3.12.463
10.3745/KTCCS.2014.3.12.463
A Study on the SmartPhone GPS based Graphical Password Approach
Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 525-532,
Dec.
2013
10.3745/KTCCS.2013.2.12.525
10.3745/KTCCS.2013.2.12.525