Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 2 |
| Keyboarding (Data Entry) | 2 |
| Coding | 1 |
| Genetics | 1 |
| Human Body | 1 |
| Identification | 1 |
| Information Security | 1 |
| Mathematics Education | 1 |
| Safety | 1 |
| Security (Psychology) | 1 |
| Technological Advancement | 1 |
| More ▼ | |
Source
| Campus Technology | 1 |
| PRIMUS | 1 |
Author
| Gale, Doug | 1 |
| Ulrich A. Hoensch | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics

Peer reviewed
Direct link
