TY - JOUR T1 - On Some Suggested Applications of Sudoku in Information Systems Security AU - Okagbue, H.I. AU - Omogbadegun, Z.O. AU - Olajide, F.A. AU - Opanuga, A.A. JO - Asian Journal of Information Technology VL - 14 IS - 4 SP - 117 EP - 121 PY - 2015 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2015.117.121 UR - https://makhillpublications.co/view-article.php?doi=ajit.2015.117.121 KW - Sudoku KW -information system KW -authentication KW -security KW -challenge response KW -passwords KW -one time passwords KW -stochastic challenge response mechanism AB - This study suggested different ways the application of Sudoku can be used in defending information systems against unauthorized access, abuse, spy or disclosure. This research showed how some simple mathematical and logical manipulations of Sudoku can generate passwords or one term passwords OTP. The enormous benefits of the research and possible applications are discussed. ER -