作者: Maresh Mark E , Whitney Michael J , Vargas Juan F , Nolan Colm
DOI:
关键词:
摘要: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects the present disclosure, a computer-implemented method may include presenting, by processing device, an user, wherein comprises plurality objects in first order; receiving, rearranged set, second comparing known stored data store; and responsive determining that matches enabling user access restricted resource.