Digital Library


Search: "[ keyword: Password ]" (16)
    A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation
    Sanghun Kim, Taenam Cho KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 7, pp. 149-156, Jul. 2020
    https://doi.org/10.3745/KTCCS.2020.9.7.149
    Keywords: Linux, Ubuntu, Password, Shadow File, Administrator Privilege

    An Effective One - Time Password Algorithm Using Time
    Joong Gil Park, Tae Joo Chang, Bong Joo Park, Jae Cheol Ryou The KIPS Transactions:PartC, Vol. 8, No. 4, pp. 373-378, Aug. 2001
    10.3745/KIPSTC.2001.8.4.373

    Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps
    Taenam Cho, SookHee Choi KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 1, pp. 9-16, Jan. 2019
    https://doi.org/10.3745/KTCCS.2019.8.1.9
    Keywords: Android, virtual keyboard, Banking App, Security, Password

    Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection
    Seung Ju Jang KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 97-104, Mar. 2015
    10.3745/KTCCS.2015.4.3.97

    Security Analysis on Password Authentication System of Web Sites
    Hee Kyeong Noh , Chang Kuk Choi , Min Su Park , Seung Joo Kim KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 12, pp. 463-478, Dec. 2014
    10.3745/KTCCS.2014.3.12.463

    A Study on the SmartPhone GPS based Graphical Password Approach
    Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 525-532, Dec. 2013
    10.3745/KTCCS.2013.2.12.525