Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Keyboarding (Data Entry) | 2 |
Coding | 1 |
Genetics | 1 |
Human Body | 1 |
Identification | 1 |
Information Security | 1 |
Mathematics Education | 1 |
Safety | 1 |
Security (Psychology) | 1 |
Technological Advancement | 1 |
More ▼ |
Source
Campus Technology | 1 |
PRIMUS | 1 |
Author
Gale, Doug | 1 |
Ulrich A. Hoensch | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics