どうしたの?

travel_explore work person_search rate_review
1ヶ月前

Quantum Computing and Identity Assurance

Hitoshi Kokumai · Bad guys, who have a quantum computer at hand, would still have to break the part of user authentication that is not dependent on the public-key scheme, prior to accessing the target data, in the normal environment where secret credentials play a big role; quite a few cryptograph ...

1ヶ月前

New Slide - Healthy Second Life of Legacy Password Systems

Hitoshi Kokumai · We’ve come up with a slide presentation for “Bring a healthy second life to your legacy password system” · “We do not have to replace or rebuild the existing text password systems for making use of episodic memory; images of our episodic memory can be turned into a high-entropy c ...

tag トレンド 全てを見る

コンテンツを最大限に活用する

orange logo