On Some Suggested Applications of Sudoku in Information Systems Security
This study suggested different ways the application of Sudoku can be used in defending information systems against unauthorized access, abuse, spy or disclosure. This research showed how some simple mathematical and logical manipulations of Sudoku can generate passwords or one term passwords OTP. The enormous benefits of the research and possible applications are discussed.
Published at Asian Journal of Information Technology
Volume 14
Issue 4
Pages 117-121
Published in 2015
Okagbue, HI; Omogbadegun, ZO; Olajide, FA; Opanuga, AA
Okagbue Hilary Izuchukwu » Hilary Izuchukwu Okagbue Obtained his B.Tech, M.Sc and Ph.D. degrees in Industrial Mathematics and Statistics from the Federal University of Technology, Owerri, University of Lagos, Covenant University in 2007, 2010 and 2019 respectively. His research interests include Data Analysis, Mathematical Statistics, Mathematical Cryptography and analysis of patterns in number theory. view full profile