Showing 1 - 3 results of 3 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Yasear, Shaymah Akram
    Published 2015
    ... and also resistant against possible attacks. However, the existing ultra-lightweight authentication...
    Get full text
    Get full text
    Thesis
  2. 2
    by Taqiyah Khadijah, Ghazali
    Published 2023
    ... and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks...
    Get full text
    Get full text
    Thesis
  3. 3
    by Shaban, Abdullah Ibrahim
    Published 2017
    ...Text-based passwords for authentication are exposed to the dictionary attack as users tend...
    Get full text
    Get full text
    Thesis