Elza Ahmad, M. F. Fahroza, Fanny Ramadhani, Ayu Syahfitri, Dimas Fadhlurohhman
{"title":"组合识别密码技术的实现","authors":"Elza Ahmad, M. F. Fahroza, Fanny Ramadhani, Ayu Syahfitri, Dimas Fadhlurohhman","doi":"10.30596/JCOSITTE.V2I1.6526","DOIUrl":null,"url":null,"abstract":"In the era of the Industrial Revolution 4.0, the use of technology has increased rapidly in less than 1 century, so that the use of technology has become a common need of society today. At this time, Users who use this technology even store personal or digitally important things such as storing important documents, personal information, even storing digital wallets or other things that are related to the user's confidentiality. so that to maintain the confidentiality of these things from other users, security is needed that can protect all the contents of the data that we have in this technology so that not just anyone can access things that are important in using this technology.","PeriodicalId":202535,"journal":{"name":"Journal of Computer Science, Information Technologi and Telecommunication Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation Of Combinatorial in Determining Password Technology\",\"authors\":\"Elza Ahmad, M. F. Fahroza, Fanny Ramadhani, Ayu Syahfitri, Dimas Fadhlurohhman\",\"doi\":\"10.30596/JCOSITTE.V2I1.6526\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the era of the Industrial Revolution 4.0, the use of technology has increased rapidly in less than 1 century, so that the use of technology has become a common need of society today. At this time, Users who use this technology even store personal or digitally important things such as storing important documents, personal information, even storing digital wallets or other things that are related to the user's confidentiality. so that to maintain the confidentiality of these things from other users, security is needed that can protect all the contents of the data that we have in this technology so that not just anyone can access things that are important in using this technology.\",\"PeriodicalId\":202535,\"journal\":{\"name\":\"Journal of Computer Science, Information Technologi and Telecommunication Engineering\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Science, Information Technologi and Telecommunication Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30596/JCOSITTE.V2I1.6526\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science, Information Technologi and Telecommunication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30596/JCOSITTE.V2I1.6526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation Of Combinatorial in Determining Password Technology
In the era of the Industrial Revolution 4.0, the use of technology has increased rapidly in less than 1 century, so that the use of technology has become a common need of society today. At this time, Users who use this technology even store personal or digitally important things such as storing important documents, personal information, even storing digital wallets or other things that are related to the user's confidentiality. so that to maintain the confidentiality of these things from other users, security is needed that can protect all the contents of the data that we have in this technology so that not just anyone can access things that are important in using this technology.