Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.
Computer Science

Questions tagged [authentication]

The tag has no summary.

Filter by
Sorted by
Tagged with
-1 votes
1 answer
96 views

I have a conundrum to solve but am not knowledgeable enough about cryptography to know whether it's possible to do, and if so, what method to use. I am a Provider and my task is to prove to some ...
2 votes
2 answers
144 views

From time to time I see systems that don't allow passwords longer than 8 chars: isn't that a security risk? What am I missing, here, that might have lead to such decision?
Pierpaolo's user avatar
  • 123
14 votes
9 answers
8k views

I understand that password storage generally uses hashing for security due to it being irreversible and that the stored hash is just compared to the hash of the password inputed by a user attempting ...
0 votes
1 answer
74 views

And is there an attack strategy that you can use to approximate the architecture of a machine learning system with the knowledge of class labels and some data points?
1 vote
0 answers
124 views

I read up on an abstract example of ZKPs (the cave and the door), but I'm trying to understand NIZKs (specifically zk-snarks and zk-stark). All the examples I can find online seem to have some ...
1 vote
2 answers
170 views

Been getting a lot more spam lately and this question came to mind. We already use SSL certificates to authenticate websites, can we do something similar for email? If so, why do I still receive ...
0 votes
2 answers
45 views

It's universally accepted that storing an unencrypted password for automated authentication is a very bad idea, for the saved password can be used by malware, etc. There is a number of systems that ...
2 votes
2 answers
388 views

I was thinking a way to send password to server secure way without using secure connection,I found one solution.I want to find flaw in this.(Note: I am begginer,dont judge me, I know little about ...
1 vote
0 answers
233 views

I am self-studying the book Intro to Algorithms 3ed by CLRS. One of the problems seems to give a piece of information that is not necessary, Problem 11-4 in the book states Let H be class of hash ...
1 vote
0 answers
121 views

I'm planning to develop an application in C# programming language for user authentication. Target platform = Newer Windows versions such as Windows 8/10. Your kind answers will be much appreciated. ...
4 votes
1 answer
151 views

Kriegspiel chess is a variant of chess in which each player is not aware of where the opponent's pieces are. In a human match, a trusted intermediary relays piece losses, legality of moves etc. This ...
7 votes
2 answers
246 views

So I was reading about ZKP on wikipedia, the abstract example in summary goes like this: Peggy wants to prove to Victor that she knows the secret to a door inside a cave that connect A and B ...
2 votes
1 answer
174 views

Hello thank you for taking time looking at this question. Is it possible to determine the keystroke patterns for a certain user? My idea is that, when the user enters their username & password it ...
2 votes
1 answer
427 views

For my computer science study, I have to design a replay attack (if possible) for the following authentication protocols. I use the standard security protocol notation. In these protocols, $A$ is ...
0 votes
1 answer
2k views

From a security level standpoint (such as Server, DataBase, Token Code, Authorization, Authentication, etc.) in regarding the Two Step Verification, usually Apple send a total of 4 digits security ...

15 30 50 per page
1
2

AltStyle によって変換されたページ (->オリジナル) /