These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

100 related articles for article (PubMed ID: 12109007)

  • 1. Improving computer security for authentication of users: influence of proactive password restrictions.
    Proctor RW; Lien MC; Vu KP; Schultz EE; Salvendy G
    Behav Res Methods Instrum Comput; 2002 May; 34(2):163-9. PubMed ID: 12109007
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Recurrent GANs Password Cracker For IoT Password Security Enhancement.
    Nam S; Jeon S; Kim H; Moon J
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486361
    [TBL] [Abstract][Full Text] [Related]  

  • 3. LPG-PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords.
    Guo X; Tan K; Liu Y; Jin M; Lu H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746386
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords.
    Lis K; Niewiadomska-Szynkiewicz E; Dziewulska K
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571467
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Security analysis and improvements to the PsychoPass method.
    Brumen B; Heričko M; Rozman I; Hölbl M
    J Med Internet Res; 2013 Aug; 15(8):e161. PubMed ID: 23942458
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Password Meter without Password Exposure.
    Kim P; Lee Y; Hong YS; Kwon T
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33419094
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A study on user authentication methodology using numeric password and fingerprint biometric information.
    Ju SH; Seo HS; Han SH; Ryou JC; Kwak J
    Biomed Res Int; 2013; 2013():427542. PubMed ID: 24151601
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication.
    Juang K; Greenstein J
    Hum Factors; 2018 Aug; 60(5):658-668. PubMed ID: 29718722
    [TBL] [Abstract][Full Text] [Related]  

  • 9. PassTCN-PPLL: A Password Guessing Model Based on Probability Label Learning and Temporal Convolutional Neural Network.
    Ye J; Jin M; Gong G; Shen R; Lu H
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080943
    [TBL] [Abstract][Full Text] [Related]  

  • 10. One-Time Password Generation and Two-Factor Authentication Using Molecules and Light.
    Naren G; Li S; Andréasson J
    Chemphyschem; 2017 Jul; 18(13):1726-1729. PubMed ID: 28252833
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.
    Ho PF; Kam YH; Wee MC; Chong YN; Por LY
    ScientificWorldJournal; 2014; 2014():838623. PubMed ID: 24991649
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.
    Chang IP; Lee TF; Lin TH; Liu CM
    Sensors (Basel); 2015 Nov; 15(12):29841-54. PubMed ID: 26633396
    [TBL] [Abstract][Full Text] [Related]  

  • 13. [Application of password manager software in health care].
    Ködmön J
    Orv Hetil; 2016 Dec; 157(52):2066-2073. PubMed ID: 28019111
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security enhanced multi-factor biometric authentication scheme using bio-hash function.
    Choi Y; Lee Y; Moon J; Won D
    PLoS One; 2017; 12(5):e0176250. PubMed ID: 28459867
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Authentication systems for securing clinical documentation workflows. A systematic literature review.
    Schwartze J; Haarbrandt B; Fortmeier D; Haux R; Seidel C
    Methods Inf Med; 2014; 53(1):3-13. PubMed ID: 24247789
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Rx for password headaches. Biometric authentication solution lets physicians be their passwords.
    Peck B
    Health Manag Technol; 2003 Jan; 24(1):50-2. PubMed ID: 12564143
    [No Abstract]   [Full Text] [Related]  

  • 17. "Passwords protect my stuff"-a study of children's password practices.
    Choong YY; Theofanos MF; Renaud K; Prior S
    J Cybersecur; 2019; 5(1):. PubMed ID: 33042580
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A resettable and reprogrammable DNA-based security system to identify multiple users with hierarchy.
    Li H; Hong W; Dong S; Liu Y; Wang E
    ACS Nano; 2014 Mar; 8(3):2796-803. PubMed ID: 24564320
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cognitive Based Authentication Protocol for Distributed Data and Web Technologies.
    Krzyworzeka N; Ogiela L; Ogiela MR
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770571
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
    Li X; Niu J; Karuppiah M; Kumari S; Wu F
    J Med Syst; 2016 Dec; 40(12):268. PubMed ID: 27734256
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.