Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
![]() |
Fifth Amendment - Compelled Decryption - Supreme Court of New Jersey Holds that Compelled Disclosure of Defendant's iPhone Passcodes Does Not Violate the Self-Incrimination ClauseHarvard law review, 2021-04, Vol.134 (6), p.2267 [Peer Reviewed Journal]COPYRIGHT 2021 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976XFull text available |
2 |
Material Type: Article
|
![]() |
Appliquer un procédé argumentaire pour revendiquer une attribution des services en ergothérapie basée sur l’habilitation aux occupationsCanadian journal of bioethics = revue canadienne de bioéthique, 2020-07, Vol.3 (1), p.134-151 [Peer Reviewed Journal]COPYRIGHT 2020 Universite de Montreal ;ISSN: 2561-4665 ;EISSN: 2561-4665 ;DOI: 10.7202/1070235arFull text available |
3 |
Material Type: Article
|
![]() |
Distinguishability of keystroke dynamic templatePloS one, 2022-01, Vol.17 (1), p.e0261291-e0261291 [Peer Reviewed Journal]COPYRIGHT 2022 Public Library of Science ;2022 Sae-Bae, Memon. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2022 Sae-Bae, Memon 2022 Sae-Bae, Memon ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0261291 ;PMID: 35061684Full text available |
4 |
Material Type: Article
|
![]() |
Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cardsPloS one, 2015-05, Vol.10 (5), p.e0126323-e0126323 [Peer Reviewed Journal]COPYRIGHT 2015 Public Library of Science ;COPYRIGHT 2015 Public Library of Science ;2015 Lu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2015 Lu et al 2015 Lu et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0126323 ;PMID: 25978373Full text available |
5 |
Material Type: Article
|
![]() |
An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart CardsPloS one, 2015-12, Vol.10 (12), p.e0145263-e0145263 [Peer Reviewed Journal]COPYRIGHT 2015 Public Library of Science ;COPYRIGHT 2015 Public Library of Science ;2015 Moon et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2015 Moon et al 2015 Moon et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0145263 ;PMID: 26709702Full text available |
6 |
Material Type: Article
|
![]() |
Cybersecurity Threats To Critical InfrastructureThe Florida bar journal, 2023-05, Vol.97 (3), p.10COPYRIGHT 2023 Florida Bar ;ISSN: 0015-3915 ;EISSN: 2163-596XFull text available |
7 |
Material Type: Article
|
![]() |
Understanding the Bounds of the Computer Fraud and Abuse Act in the Wake of Van BurenThe Florida bar journal, 2022-03, Vol.96 (2), p.22COPYRIGHT 2022 Florida Bar ;ISSN: 0015-3915 ;EISSN: 2163-596XFull text available |
8 |
Material Type: Article
|
![]() |
Developing a typology of network alteration strategies for implementation: a scoping review and iterative synthesisImplementation science : IS, 2023-04, Vol.18 (1), p.10-10, Article 10 [Peer Reviewed Journal]2023. The Author(s). ;COPYRIGHT 2023 BioMed Central Ltd. ;2023. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2023 ;ISSN: 1748-5908 ;EISSN: 1748-5908 ;DOI: 10.1186/s13012-023-01266-3 ;PMID: 37024916Full text available |
9 |
Material Type: Article
|
![]() |
Prioritizing security over usability: Strategies for how people choose passwordsJournal of cybersecurity (Oxford), 2021-01, Vol.7 (1) [Peer Reviewed Journal]The Author(s) 2021. Published by Oxford University Press. 2021 ;ISSN: 2057-2085 ;EISSN: 2057-2093 ;DOI: 10.1093/cybsec/tyab012Full text available |
10 |
Material Type: Article
|
![]() |
How the Supreme Court's Decision in Van Buren Impacts Mobile Employees and Computer Data Theft in FloridaThe Florida bar journal, 2022-03, Vol.96 (2), p.30COPYRIGHT 2022 Florida Bar ;ISSN: 0015-3915 ;EISSN: 2163-596XFull text available |
11 |
Material Type: Article
|
![]() |
The Generative InternetHarvard law review, 2006-05, Vol.119 (7), p.1974-2040 [Peer Reviewed Journal]Copyright 2006 The Harvard Law Review Association ;COPYRIGHT 2006 Harvard Law Review Association ;COPYRIGHT 2006 Harvard Law Review Association ;Copyright Harvard Law Review Association May 2006 ;ISSN: 0017-811X ;EISSN: 2161-976X ;CODEN: HALRAFFull text available |
12 |
Material Type: Article
|
![]() |
Decriminalizing Trivial Computer Use: The Need to Narrow the Computer Fraud and Abuse Act (CFAA) After Van BurenFederal communications law journal, 2024-01, Vol.76 (2), p.239-268 [Peer Reviewed Journal]COPYRIGHT 2024 The George Washington University Law School ;Copyright George Washington University, National Law Center Jan 2024 ;ISSN: 0163-7606 ;EISSN: 2376-4457Full text available |
13 |
Material Type: Article
|
![]() |
A digital memories based user authentication scheme with privacy preservationPloS one, 2017-11, Vol.12 (11), p.e0186925-e0186925 [Peer Reviewed Journal]COPYRIGHT 2017 Public Library of Science ;COPYRIGHT 2017 Public Library of Science ;2017 Liu et al 2017 Liu et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0186925 ;PMID: 29190659Full text available |
14 |
Material Type: Article
|
![]() |
Criminal law - Computer Fraud and Abuse Act - Ninth Circuit affirms conviction of a former employee who used another employee's passwordHarvard law review, 2017-02, Vol.130 (4), p.1265 [Peer Reviewed Journal]COPYRIGHT 2017 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976XFull text available |
15 |
Material Type: Article
|
![]() |
CRIMINAL PROCEDURE - FORENSIC SEARCHES OF DIGITAL INFORMATION AT THE BORDER - ELEVENTH CIRCUIT HOLDS THAT BORDER SEARCHES OF PROPERTY REQUIRE NO SUSPICIONHarvard law review, 2019-01, Vol.132 (3), p.1112 [Peer Reviewed Journal]COPYRIGHT 2019 Harvard Law Review Association ;COPYRIGHT 2019 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976XFull text available |
16 |
Material Type: Article
|
![]() |
Personality and Cognitive Factors in Password Security BehaviorsNorth American journal of psychology, 2023-09, Vol.25 (3), p.599-618 [Peer Reviewed Journal]COPYRIGHT 2023 North American Journal of Psychology ;Copyright North American Journal of Psychology Sep 2023 ;ISSN: 1527-7143Full text available |
17 |
Material Type: Article
|
![]() |
Performance measures for evaluating the dynamic authentication techniquesInternational journal of cyber-security and digital forensics, 2016-04, p.30COPYRIGHT 2016 The Society of Digital Information and Wireless Communications ;ISSN: 2305-0012 ;EISSN: 2305-0012Full text available |
18 |
Material Type: Article
|
![]() |
The "New Abnormal"--The Emergence of Persistently Insecure Digital SystemsThe Business lawyer, 2021-12, Vol.77 (1), p.263 [Peer Reviewed Journal]COPYRIGHT 2021 American Bar Association ;ISSN: 0007-6899 ;EISSN: 2164-1838Full text available |
19 |
Material Type: Article
|
![]() |
Balancing Password Security and User Convenience: Exploring the Potential of Prompt Models for Password GenerationElectronics (Basel), 2023-05, Vol.12 (10), p.2159 [Peer Reviewed Journal]COPYRIGHT 2023 MDPI AG ;2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2079-9292 ;EISSN: 2079-9292 ;DOI: 10.3390/electronics12102159Full text available |
20 |
Material Type: Article
|
![]() |
Constitutional law - Fourth Amendment - Ninth Circuit holds forensic search of laptop seized at border requires showing of reasonable suspicionHarvard law review, 2014-01, Vol.127 (3), p.1041 [Peer Reviewed Journal]COPYRIGHT 2014 Harvard Law Review Association ;COPYRIGHT 2014 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976XFull text available |