University Links: Home Page | Site Map
Covenant University Repository

On Some Suggested Applications of Sudoku in Information Systems Security

Okagbue, H. I. and Omogbadegun, Zacchaeus O. and Olajide, F. A. and Opanuga, A. A. (2015) On Some Suggested Applications of Sudoku in Information Systems Security. Asian Journal of Information Technology, 14 (4). pp. 117-121. ISSN 1682-3915

[img] PDF
Download (151kB)


This study suggested different ways the application of Sudoku can be used in defending information systems against unauthorized access, abuse, spy or disclosure. This research showed how some simple mathematical and logical manipulations of Sudoku can generate passwords or one term passwords OTP. The enormous benefits of the research and possible applications are discussed

Item Type: Article
Uncontrolled Keywords: Sudoku, information system, security, authentication, challenge response, passwords, one time passwords, stochastic challenge response mechanism
Subjects: Q Science > QA Mathematics
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Engineering, Science and Mathematics > School of Mathematics
Depositing User: Mrs Patricia Nwokealisi
Date Deposited: 28 Sep 2015 10:12
Last Modified: 28 Sep 2015 10:12

Actions (login required)

View Item View Item