2020
DOI: 10.1007/978-3-030-62433-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Password Management: How Secure Is Your Login Process?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…[160]. Here, privacy violations may reflect more traditional conceptualizations of privacy attacks or security violations [69,90] and privacy elements beyond what may be protected by regulations or under the traditional purview of a privacy officer [119,159]. For instance, privacy violence may arise from algorithmic systems making predictive inference beyond what users openly disclose [196] or when data collected and algorithmic inferences made about people in one context is applied to another without the person's knowledge or consent through big data flows [119], even after those datasets or systems have been deprecated [50,72].…”
Section: Privacy Violationmentioning
confidence: 99%
“…[160]. Here, privacy violations may reflect more traditional conceptualizations of privacy attacks or security violations [69,90] and privacy elements beyond what may be protected by regulations or under the traditional purview of a privacy officer [119,159]. For instance, privacy violence may arise from algorithmic systems making predictive inference beyond what users openly disclose [196] or when data collected and algorithmic inferences made about people in one context is applied to another without the person's knowledge or consent through big data flows [119], even after those datasets or systems have been deprecated [50,72].…”
Section: Privacy Violationmentioning
confidence: 99%
“…Service providers and applications also needs to keep their security in check. It is also known that several vulnerabilities are found in the service providers [7].…”
Section: Introductionmentioning
confidence: 99%
“…It has been created by Colin Percival [13]. It has been employed for many services and applications due to its protection ability [14,15]. It has also been employed as a proof-of-work algorithm in the blockchain implementations [16].…”
Section: Introductionmentioning
confidence: 99%