The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for passwords with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1990 (15) 1991-1995 (18) 1996-1997 (16) 1998-2000 (19) 2001 (17) 2002 (19) 2003 (26) 2004 (44) 2005 (68) 2006 (83) 2007 (67) 2008 (90) 2009 (66) 2010 (26) 2011 (27) 2012 (36) 2013 (41) 2014 (59) 2015 (54) 2016 (37) 2017 (55) 2018 (39) 2019 (41) 2020 (36) 2021 (34) 2022 (26) 2023 (30) 2024 (5)
Publication types (Num. hits)
article(284) book(1) incollection(2) inproceedings(793) phdthesis(12) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 815 occurrences of 362 keywords

Results
Found 1094 publication records. Showing 1094 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Terry Fleury, Jim Basney, Von Welch Single sign-on for java web start applications using myproxy. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF session passwords, single sign-on, grid portals
36Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant Password Memorability and Security: Empirical Results. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, usability, passwords
36Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
35Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera Extracting Kerberos passwords through RC4-HMAC encryption type analysis. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger New Side Channels Targeted at Passwords. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Alain Forget, Sonia Chiasson, Robert Biddle Helping users create better passwords: is this the right approach? Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Jean-Camille Birget, Dawei Hong, Nasir D. Memon Graphical passwords based on robust discretization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Darko Kirovski, Nebojsa Jojic, Paul Roberts Click Passwords. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Vladimir Kolesnikov, Charles Rackoff Key Exchange Using Passwords and Long Keys. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Dianne Brotherson Turning the titanic: changing a PIN to a password. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PIN numbers, strong passwords, passwords, conversion, password security, login
33Qingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan 0001, Peng Cheng 0011, Charles Chen New Anti-phishing Method with Two Types of Passwords in OpenID System. Search on Bibsonomy ICGEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Two passwords, Single sign on (SSO), OpenID, Anti-phishing
33Minh-Huyen Nguyen, Salil P. Vadhan Simpler Session-Key Generation from Short Random Passwords. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Human-memorizable passwords, Authentication, Cryptographic protocols, Key exchange, Secure two-party computation
33Daphna Weinshall, Scott Kirkpatrick Passwords you'll never forget, but can't recall. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, passwords, identity, adaptive interfaces, human memory
32Yee-Yin Choong, Kerrianne Buchanan, Olivia Williams Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children's Password Practices. Search on Bibsonomy HCI (35) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Weili Han, Ming Xu 0006, Junjie Zhang, Chuanwang Wang, Kai Zhang 0006, X. Sean Wang TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Mary Theofanos, Yee-Yin Choong, Olivia Murphy 'Passwords Keep Me Safe' - Understanding What Children Think about Passwords. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2021 DBLP  BibTeX  RDF
32Jessica Fong, Ron Poet Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Richard Beno, Ron Poet Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Jikai Li, Ethan Zeigler, Thomas Holland, Dimitris Papamichail, David Greco, Joshua Grabenstein, Daan Liang Common Passwords and Common Words in Passwords. Search on Bibsonomy WorldCIST (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Karen Renaud, Robert F. Otondo, Merrill Warkentin "This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? Search on Bibsonomy Comput. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Bing Yao, Xiaohui Zhang 0009, Hui Sun, Yarong Mu, Yirong Sun, Xiaomin Wang, Hongyu Wang 0006, Fei Ma, Jing Su, Chao Yang 0032, Sihua Yang, Mingjun Zhang Text-based Passwords Generated From Topological Graphic Passwords. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
32Chedy Missaoui, Safa Bachouch, Ibrahim Abdelkader, Slim Trabelsi Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures. Search on Bibsonomy CSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Viktor Taneski, Marjan Hericko, Bostjan Brumen Analysing real students' passwords and students' passwords characteristics received from a questionnaire. Search on Bibsonomy MIPRO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Xiujia Guo, Haibo Chen, Xuqin Liu, Xiangyu Xu, Zhong Chen 0001 The Scale-free Network of Passwords : Visualization and Estimation of Empirical Passwords. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
32Florian Alt, Stefan Schneegass, Alireza Sahami Shirazi, Mariam Hassib, Andreas Bulling Graphical Passwords in the Wild: Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes. Search on Bibsonomy MobileHCI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Hani Moaiteq Aljahdali, Ron Poet Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
32S. M. Taiabul Haque, Matthew K. Wright, Shannon Scielzo Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets. Search on Bibsonomy SPSM@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
32Murat Akpulat, Kemal Bicakci, Ugur Cil Revisiting graphical passwords for augmenting, not replacing, text passwords. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Andrea Bianchi, Ian Oakley, Dong-Soo Kwon The secure haptic keypad: a tactile password system. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pin entry, tactile ui, security, user study
29Andrea Bianchi, Ian Oakley, Jong Keun Lee, Dong-Soo Kwon The haptic wheel: design & evaluation of a tactile password system. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pin entry, tactile ui, security, non-visual interaction
29Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu, Uwe Aickelin The effect of baroque music on the PassPoints graphical password. Search on Bibsonomy CIVR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF PassPoints, baroque music, graphical password, memorability
29Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Alice Boit, Thomas Geimer, Jörn Loviscach A random cursor matrix to hide graphical password input. Search on Bibsonomy SIGGRAPH Posters The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Hua Wang, Yao Guo 0001, Xiangqun Chen DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Muhammad Daniel Hafiz Abdullah, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah Kutty Mammi Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Usability, Authentication, Password, Graphical Password
29Markus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang Love and authentication. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF entry error, security question, security, password, reset
29M. N. Doja 0001, Naveen Kumar 0008 Image Authentication Schemes against Key-Logger Spyware. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen Analysis and Design of Graphical Password Techniques. Search on Bibsonomy ISVC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Muhammad Khurram Khan, Jiashu Zhang An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Bogdan Hoanca, Kenrick J. Mock Secure graphical password system for high traffic public areas. Search on Bibsonomy ETRA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Li Zhuang, Feng Zhou, J. D. Tygar Keyboard acoustic emanations revisited. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF acoustic emanations, cepstrum, electronic eavesdropping, privacy, HMM, hidden Markov models, human factors, computer security, learning theory, keyboards, signal analysis
29Martín Abadi, Bogdan Warinschi Password-Based Encryption Analyzed. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Saeed Rajput, Jihong Chen, Sam Hsu State based authentication. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management
29Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon 0002 Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Maria Nilsson, Anne Adams, Simon Herd Building security and trust in online banking. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2005 DBLP  DOI  BibTeX  RDF e-commerce, situational awareness, online banking
29Desney S. Tan, Pedram Keyani, Mary Czerwinski Spy-resistant keyboard: more secure password entry on public touch screen displays. Search on Bibsonomy OZCHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF password, visual search, touch screen, keyboard, selective attention, input technique
29Divyangi Anchan, Mahmoud Pegah Regaining single sign-on taming the beast. Search on Bibsonomy SIGUCCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF account synchronization, active directory (AD), active directory service interfaces (ADSI), password synchronization, single sign-on, LDAP, RPC
29Massimo Merro, Matthew Hennessy Bisimulation congruences in safe ambients. Search on Bibsonomy POPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29J. Archer Harris OPA: A One-Time Password System. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Jeff Jianxin Yan A note on proactive password checking. Search on Bibsonomy NSPW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF entropy, dictionary attack, proactive password checking
29Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen Robust and Secure Password and Key Change Method. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
29T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham Reducing Risks from Poorly Chosen Keys. Search on Bibsonomy SOSP The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
27David Kim, Paul Dunphy, Pamela Briggs, Jonathan Hook, John Nicholson, James Nicholson, Patrick Olivier Multi-touch authentication on tabletops. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF user authentication, graphical passwords, multi-touch interaction, shoulder surfing
27Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith TwoKind authentication: protecting private information in untrustworthy environments. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF principle of least privilege, authenticators, passwords
27Baris Coskun, Cormac Herley Can "Something You Know" Be Saved?. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, passwords, challenge response
27Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig Use Your Illusion: secure authentication usable anywhere. Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distortion, graphical passwords, social engineering
27Paul Dunphy, James Nicholson, Patrick Olivier Securing passfaces for description. Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF passfaces, graphical passwords, description
27Dinei A. F. Florêncio, Cormac Herley Evaluating a trial deployment of password re-use for phishing prevention. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, access control, passwords, phishing
27Ahmet Emir Dirik, Nasir D. Memon, Jean-Camille Birget Modeling user choice in the PassPoints graphical password scheme. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF password entropy, user behavior, graphical passwords, dictionary attack
27Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Jean-Camille Birget Design and evaluation of a shoulder-surfing resistant graphical password scheme. Search on Bibsonomy AVI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF convex hull click scheme, authentication, usable security, graphical passwords, shoulder-surfing, password security
27Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini Metrics of Password Management Policy. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, passwords, Security management, assurance
27Marc Parizeau, Réjean Plamondon A Comparative Analysis of Regional Correlation, Dynamic Time Warping, and Skeletal Tree Matching for Signature Verification. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF regional correlation, skeletal tree matching, signal matching algorithms, verification error rates, script types, handwritten passwords, signal representation spaces, character recognition, character recognition, computerised pattern recognition, trees (mathematics), dynamic time warping, signature verification, correlation methods
25Andrew Harding, Timothy W. van der Horst, Kent E. Seamons Wireless authentication using remote passwords. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SAW, decentralized wireless authentication, SRP
25Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan Graphical passwords & qualitative spatial relations. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Oded Goldreich 0001, Yehuda Lindell Session-Key Generation Using Human Passwords Only. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Dinei A. F. Florêncio, Cormac Herley KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley Call Center Customer Verification by Query-Directed Passwords. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Taekyoung Kwon 0002 Practical Authenticated Key Agreement Using Passwords. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Ching-Te Wang, Chin-Chen Chang 0001, Chu-Hsing Lin Using IC Cards to Remotely Login Passwords without Verification Tables. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF discrete logarithms, timestamp, one-way function, Password authentication
25Kemal Bicakci, Nazife Baykal One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park Password-Authenticated Key Exchange between Clients with Different Passwords. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key exchange, Password authentication, dictionary attack, Kerberos, cross-realm
25Oded Goldreich 0001, Yehuda Lindell Session-Key Generation Using Human Passwords Only. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Dinei A. F. Florêncio, Cormac Herley Where do security policies come from? Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Richard Shay, Elisa Bertino A comprehensive simulation tool for the analysis of password policies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Simulation, Management, Policy, Password
19Khaled Alghathbar, Hanan A. Mahmoud Noisy password scheme: A new one time password system. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Stephen Farrell Password Policy Purgatory. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19T. Rakesh Kumar, S. V. Raghavan PassPattern System (PPS): A Pattern-Based User Authentication Scheme. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, User Authentication
19Mohammad Mannan, Paul C. van Oorschot Privacy-enhanced sharing of personal content on the web. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF circle of trust, privacy, access control, sharing
19Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell, Nicholas Bambos Security Decision-Making among Interdependent Organizations. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Linear Complementarity, Security, Game Theory
19Kimmo Halunen, Pauli Rikula, Juha Röning On the Security of VSH in Password Schemes. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VSH, hash function, preimage attack, password security
19Mizuki Oka, Kazuhiko Kato, Yingqing Xu, Lin Liang, Fang Wen 0001 Scribble-a-Secret: Similarity-based password authentication using sketches. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Luigi Catuogno, Clemente Galdi A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Girija Chetty, Dharmendra Sharma 0001, Bala M. Balachandran An Agent Based Multifactor Biometric Security System. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multifactor fusion, mobile agents, biometric, smartcard
19Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision
19Claus Wonnemann, Jens Strüker Password Management for EPC Class 1 Generation 2 Transponders. Search on Bibsonomy CEC/EEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu YAGP: Yet Another Graphical Password Strategy. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Dario Catalano, David Pointcheval, Thomas Pornin Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Daniel Ramsbrock, Robin Berthier, Michel Cukier Profiling Attacker Behavior Following SSH Compromises. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Timothy W. van der Horst, Kent E. Seamons Simple authentication for the web. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF password alternative, web single sign-on, authentication
19Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 Using the mobile phone as a security token for unified authentication. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentcation, mobility
19José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
19Yanjiang Yang, Robert H. Deng, Feng Bao 0001 A Practical Password-Based Two-Server Authentication and Key Exchange System. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Password system, password verification data (PVD), offline dictionary attack, key exchange, user authentication
19Nick Bartlow, Bojan Cukic Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee 0001, Dowon Hong Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-layer ad-hoc network, pervasive computing, heterogeneous, key agreement, Password authentication, authenticated key exchange
19Hyunsoo Song, Taekyoung Kwon 0002 Security Analysis of Secure Password Authentication for Keystroke Dynamics. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won Two Efficient and Secure Authentication Schemes Using Smart Cards. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, password, mutual authentication, Authentication scheme
19Guilin Wang, Feng Bao 0001 Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, hash function, attack, password authentication
19Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang A user authentication system using back-propagation network. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Neural network, Information security, User authentication, One-way hash function, Back-propagation network
Displaying result #101 - #200 of 1094 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license