<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-7890</journal-id>
<journal-title><![CDATA[Dilemas contemporáneos: educación, política y valores]]></journal-title>
<abbrev-journal-title><![CDATA[Dilemas contemp. educ. política valores]]></abbrev-journal-title>
<issn>2007-7890</issn>
<publisher>
<publisher-name><![CDATA[Asesorías y tutorías para la investigación científica en la Educación Puig-Salabarría S.C.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-78902021000600017</article-id>
<article-id pub-id-type="doi">10.46377/dilemas.v8i.2768</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Política para la creación de contraseñas usando números en dialectos mexicanos en instituciones educativas]]></article-title>
<article-title xml:lang="en"><![CDATA[Policy for creating passwords using numbers in Mexican dialects in educational institutions]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salazar Hernández]]></surname>
<given-names><![CDATA[Rolando]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López Mendoza]]></surname>
<given-names><![CDATA[Adán]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Tamaulipas Facultad de Comercio, Administración y Ciencias Sociales ]]></institution>
<addr-line><![CDATA[Nuevo Laredo Tamaulipas]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma de Tamaulipas Facultad de Comercio, Administración y Ciencias Sociales ]]></institution>
<addr-line><![CDATA[Nuevo Laredo Tamaulipas]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<volume>8</volume>
<numero>spe4</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-78902021000600017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-78902021000600017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-78902021000600017&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Existen algunas formas de autenticarse en los sistemas computacionales locales o remotos, ya bien sean portales web o aplicaciones. La mayoría de estas aplicaciones se autentica a través de las credenciales de los usuarios, una cuenta y una contraseña. Se ha demostrado a través de la literatura consultada que muchos usuarios utilizan contraseñas débiles formadas por palabras que se pueden encontrar en diccionarios de palabras de diferentes idiomas. En el presente artículo presentamos una técnica que permita robustecer las contraseñas de usuario a través del uso de los números de tres dialectos mexicanos sin tener que memorizar la contraseña sino utilizar una aplicación portable o la interpolación e intercalación de palabras.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract There are some ways to authenticate to local or remote computer systems, whether they are web portals or applications. Most of these applications authenticate through user credentials, an account, and a password. It has been shown through the consulted literature that many users use weak passwords made up of words that can be found in dictionaries of words from different languages. In this article we present a technique that allows us to strengthen user passwords through the use of the numbers of three Mexican dialects without having to memorize the password but instead using a portable application or the interpolation and interleaving of words.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[autenticación]]></kwd>
<kwd lng="es"><![CDATA[contraseña]]></kwd>
<kwd lng="es"><![CDATA[robustecer]]></kwd>
<kwd lng="es"><![CDATA[dialectos]]></kwd>
<kwd lng="en"><![CDATA[authentication]]></kwd>
<kwd lng="en"><![CDATA[password]]></kwd>
<kwd lng="en"><![CDATA[robust]]></kwd>
<kwd lng="en"><![CDATA[dialects]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alodhyani]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Theodorakopoulos]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Reinecke]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Password managers-it&#8217;s all about trust and transparency]]></article-title>
<source><![CDATA[Future Internet]]></source>
<year>2020</year>
<volume>12</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1-50</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blonder]]></surname>
<given-names><![CDATA[G. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Graphical Password]]></source>
<year>1996</year>
<publisher-loc><![CDATA[United States of America ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>3.</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakrabarti]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Landon]]></surname>
<given-names><![CDATA[G. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Singhal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Graphical passwords: Drawing a secret with rotation as a new degree of freedom]]></article-title>
<source><![CDATA[Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, 2007]]></source>
<year>2007</year>
<page-range>114-20</page-range><publisher-name><![CDATA[AsiaCSN]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4.</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cherdmuangpak]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Anusas-Amonkul]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Limthanmaphon]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Two factor image-based password authentication for junior high school students]]></article-title>
<source><![CDATA[Proceedings of the 2017 14th International Joint Conference on Computer Science and Software Engineering, 2017]]></source>
<year>2017</year>
<page-range>12-7</page-range><publisher-name><![CDATA[JCSSE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5.</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Glory]]></surname>
<given-names><![CDATA[F. Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Ul Aftab]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tremblay-Savard]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Mohammed]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Strong Password Generation Based on User Inputs]]></article-title>
<source><![CDATA[2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference, 2019]]></source>
<year>2019</year>
<page-range>416-23</page-range><publisher-name><![CDATA[IEMCON]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6.</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gurav]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gawade]]></surname>
<given-names><![CDATA[L. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rane]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Khochare]]></surname>
<given-names><![CDATA[N. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Graphical password authentication: Cloud securing scheme]]></article-title>
<source><![CDATA[Proceedings - International Conference on Electronic Systems, Signal Processing, and Computing Technologies, 2014]]></source>
<year>2014</year>
<page-range>479-83</page-range><publisher-name><![CDATA[ICESC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jablon]]></surname>
<given-names><![CDATA[D. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Strong Password-Only Authenticated Key Exchange]]></source>
<year>1996</year>
<page-range>5-26</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khanaa]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Thooyamani]]></surname>
<given-names><![CDATA[K. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Udayakumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Two factor authentication using mobile phones]]></article-title>
<source><![CDATA[World Applied Sciences Journal]]></source>
<year>2014</year>
<volume>29</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>208-13</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9.</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maqbali]]></surname>
<given-names><![CDATA[F. Al]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[AutoPass: An automatic password generator]]></source>
<year>2017</year>
<conf-name><![CDATA[ Proceedings - International Carnahan Conference on Security Technology, 2017]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morris]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Password Security: A Case History]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>1979</year>
<volume>22</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>594-7</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11.</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shay]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Komanduri]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kelley]]></surname>
<given-names><![CDATA[P. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Leon]]></surname>
<given-names><![CDATA[P. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazurek]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Bauer]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Cranor]]></surname>
<given-names><![CDATA[L. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Encountering stronger password requirements: User attitudes and behaviors]]></source>
<year>2010</year>
<conf-name><![CDATA[ ACM International Conference Proceeding Series]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>12.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Aggarwal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Collins]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Stern]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Testing metrics for password creation policies by attacking large sets of revealed password]]></article-title>
<source><![CDATA[Proceedings of the ACM Conference on Computer and Communications Security]]></source>
<year>2010</year>
<page-range>162-75</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Alan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Grant]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Password memorability and security: Empirical results]]></article-title>
<source><![CDATA[IEEE Security and Privacy]]></source>
<year>2004</year>
<volume>2</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>25-31</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
