Published on in Vol 15, No 8 (2013): August

Security Analysis and Improvements to the PsychoPass Method

Security Analysis and Improvements to the PsychoPass Method

Security Analysis and Improvements to the PsychoPass Method

Journals

  1. Brumen B. System-Assigned Passwords: The Disadvantages of the Strict Password Management Policies. Informatica 2020:459 View
  2. Brumen B. Security analysis of Game Changer Password System. International Journal of Human-Computer Studies 2019;126:44 View

Books/Policy Documents

  1. Bäumer F, Geierhos M, Schulze S. Information and Software Technologies. View

Conference Proceedings

  1. Gadicha V, Alvi A. 2015 International Conference on Communications and Signal Processing (ICCSP). A review towards enhancing authentication scheme using Image Fusion and multishared Cryptography View
  2. Brumen B, Ivancic R, Rozman I. 2016 Portland International Conference on Management of Engineering and Technology (PICMET). A comparison of password management policies View
  3. Brumen B, Cernezel A. 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Brute force analysis of PsychoPass-generated Passwords View
  4. Jaakkola H, Makinen T, Henno J, Makela J. 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Open<sup>n</sup> View
  5. Brumen B, Taneski V. 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Moore's curse on textual passwords View