Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (2)
- This year (0)
- Last 5 years (1)
- Last 10 years (2)
T Th he e U Us se ef fu ul ln ne es ss s o of f M Mu ul lt ti il le ev ve el l H Ha as sh h T Ta ab bl le es s w wi it th h M Mu ul lt ti ip pl le e H Ha as sh h F Fu un nc ct ti io on ns s i in n L La ar rg ge e D Da at ta ab ba as se es s A A. .T T.. A Ak ki in nw wa al le e a an nd d F ABSTRACT: In this work, attempt is made to select three good hash… (More)
This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study… (More)