The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for password with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1986 (15) 1987-1989 (15) 1990-1993 (21) 1994-1995 (17) 1996-1997 (18) 1998-1999 (30) 2000 (27) 2001 (38) 2002 (38) 2003 (70) 2004 (106) 2005 (159) 2006 (182) 2007 (160) 2008 (176) 2009 (154) 2010 (123) 2011 (122) 2012 (118) 2013 (148) 2014 (151) 2015 (150) 2016 (145) 2017 (186) 2018 (163) 2019 (155) 2020 (160) 2021 (151) 2022 (124) 2023 (123) 2024 (24)
Publication types (Num. hits)
article(1329) book(1) incollection(8) inproceedings(1898) phdthesis(33)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1427 occurrences of 503 keywords

Results
Found 3269 publication records. Showing 3269 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Zhiguo Wan, Shuhong Wang 0001 Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Salvador Mandujano, Rogelio Soto Deterring Password Sharing: User Authentication via Fuzzy c-Means Clustering Applied to Keystroke Biometric Data. Search on Bibsonomy ENC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Stephen Pellicer, Yi Pan 0001, Minyi Guo Distributed MD4 Password Hashing with Grid Computing Package BOINC. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Chin-Chen Chang 0001, Jung-San Lee An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards. Search on Bibsonomy CW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Dario Catalano, David Pointcheval, Thomas Pornin IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 Efficient Password-Based Group Key Exchange. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Su Jung Yu, Joo-Seok Song An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux Password Interception in a SSL/TLS Channel. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Seoksoo Kim, Dae-Joon Hwang An Algorithm for Formation and Confirmation of Password for Paid Members on the Internet-Based Telemedicine. Search on Bibsonomy Human.Society@Internet The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Jonathan Katz, Rafail Ostrovsky, Moti Yung Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Yun Ding, Patrick Horster Undetectable On-line Password Guessing Attacks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26Feng Hao 0001 On Small Subgroup Non-confinement Attack. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Secure Remote Password protocol, secure communication, password authenticated key exchange
26Stephen Keung, Kai-Yeung Siu Efficient protocols secure against guessing and replay attacks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks
25Anthony Larcher, Jean-François Bonastre, John S. D. Mason Constrained Viterbi decoding for embedded user-customised password speaker recognition. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF password recognition, embedded system, speaker recognition, Viterbi decoding
25Yanjiang Yang, Feng Bao 0001 Enabling Use of Single Password over Multiple Servers in Two-Server Model. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF two-server model, password authentication, guessing attacks
25Dexin Yang, Bo Yang A Novel Two-Server Password Authentication Scheme with Provable Security. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Two-server, Key exchange, Password authentication, Computational Diffie-hellman problem
25Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin Against Spyware Using CAPTCHA in Graphical Password Scheme. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF authentication, CAPTCHA, spyware, graphical password
25Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu, Uwe Aickelin A New Graphical Password Scheme Resistant to Shoulder-Surfing. Search on Bibsonomy CW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF authentication, PDA, graphical password, shoulder-surfing
25Kangbin Yim A New Noise Mingling Approach to Protect the Authentication Password. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF H/W vulnerability, password expose, keyboard
25Bogdan Groza Analysis of a Password Strengthening Technique and Its Practical Use. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, protocol, password
25Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting-Ching Lin A One-Time Password Scheme with QR-Code Based on Mobile Phone. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile Phone, User Authentication, QR Code, One-time Password
25Haichang Gao, Xiyang Liu, Ruyi Dai, Sidong Wang, Xiuling Chang Analysis and Evaluation of the ColorLogin Graphical Password Scheme. Search on Bibsonomy ICIG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ColorLogin, graphical password, shoulder surfing
25Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation
25Raphael C.-W. Phan Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model, cryptanalysis, group, proof, Password-authenticated key exchange
25Tzong-Chen Wu, Hung-Yu Chien Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, authentication, semantic security, password guessing attack
25Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun A Design of One-Time Password Mechanism Using Public Key Infrastructure. Search on Bibsonomy NCM (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Certificate, PKI, One-time password
25Eun-Jun Yoon, Kee-Young Yoo Improving the Generalized Password-Based Authenticated Key Agreement Protocol. Search on Bibsonomy GPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Password, Key agreement, Guessing attack
25Desney S. Tan, Pedram Keyani, Mary Czerwinski Spy-resistant keyboard: more secure password entry on public touch screen displays. Search on Bibsonomy OZCHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF password, visual search, touch screen, keyboard, selective attention, input technique
25Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
25Li Gong Optimal authentication protocols resistant to password guessing attacks. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks
24Alain Forget, Sonia Chiasson, Robert Biddle Input precision for gaze-based graphical passwords. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF eye tracking, usable security, graphical passwords
24Alain Forget, Sonia Chiasson, Robert Biddle Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF eye tracking, usable security, graphical passwords
24Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
24Minh-Huyen Nguyen, Salil P. Vadhan Simpler Session-Key Generation from Short Random Passwords. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Human-memorizable passwords, Authentication, Cryptographic protocols, Key exchange, Secure two-party computation
24Alain Forget, Robert Biddle Memorability of persuasive passwords. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, memory, computer security, passwords, persuasive technology, usable security, chunking
24Saranga Komanduri, Dugald Ralph Hutchings Order and entropy in picture passwords. Search on Bibsonomy Graphics Interface The full citation details ... 2008 DBLP  BibTeX  RDF graphical authentication, picture superiority, shoulder surfing
24Eun-Ser Lee, Sang Ho Lee 0004 Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Paul Dunphy, Jeff Yan Do background images improve "draw a secret" graphical passwords? Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF draw a secret, security, usable security, graphical passwords, memorability
24Mohammad Shirali-Shahreza Improving Mobile Banking Security Using Steganography. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Roman V. Yampolskiy Secure Network Authentication with PassText. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Chen Yang, Wenping Ma 0002, Xinmei Wang Novel Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Alain Forget, Sonia Chiasson, Robert Biddle Helping users create better passwords: is this the right approach? Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan Graphical passwords & qualitative spatial relations. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi Implementing identity provider on mobile phone. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity provider, authentication, mobile phone, federated identity
24Jongpil Jeong, Min Young Chung, Hyunseung Choo Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Warren Harrison Passwords and Passion. Search on Bibsonomy IEEE Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, passwords, system security
24Mo Nishiyama, Leslie J. McNeil, Holly E. Wyatt The matrix and beyond: expanding proactive resources for customers. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF role-based matrix, workflow improvement, communication, knowledge management, portals, customer service, electronic documentation
24Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Crypto-Biometric, Cancelable Template, Privacy, Fuzzy Vault
24Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dinei A. F. Florêncio, Cormac Herley KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Vassilis Poursalidis, Christos Nikolaou A New User-Centric Identity Management Infrastructure for Federated Systems. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Breno de Medeiros Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Jin Wook Byun, Dong Hoon Lee 0001 N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24SeongHan Shin, Kazukuni Kobara, Hideki Imai A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Wei-Chi Ku, Maw-Jinn Tsaur A Remote User Authentication Scheme Using Strong Graphical Passwords. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Lin Chen 0020, Xiaoqin Huang, Jinyuan You Certificate-Based Authentication and Authorization Architecture in Digital Library. Search on Bibsonomy ICADL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Minh-Huyen Nguyen, Salil P. Vadhan Simpler Session-Key Generation from Short Random Passwords. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati A Novel Remote User Authentication Scheme Through Dynamic Login Identity. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Amit Purohit, Vishnu Navda, Tzi-cker Chiueh Tracing the Root of "Rootable" Processes. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Radu Sion, Mikhail J. Atallah, Sunil Prabhakar On-the-fly Intrusion Detection for Web Portals. Search on Bibsonomy ITCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Michael K. Reiter, Asad Samar, Chenxi Wang The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Takamichi Saito, Toshiyuki Kito, Kentaro Umesawa, Fumio Mizoguchi Architectural Defects of the Secure Shell. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24John A. Trono Comments on "Tagged Semaphores". Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Michael Steiner 0001, Gene Tsudik, Michael Waidner Refinement and Extension of Encrypted Key Exchange. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
24Jochen Liedtke A Short Note on Small Virtually-Addresses Control Blocks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
23Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Zhendong Zhang, Peng Liu 0016, Weidong Wang, Yingtao Jiang RUPA: A High Performance, Energy Efficient Accelerator for Rule-Based Password Generation in Heterogenous Password Recovery System. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Xizhe Zhang, Xiong Zhang, Jiahao Hu, Yuesheng Zhu A New Targeted Online Password Guessing Algorithm Based on Old Password. Search on Bibsonomy CSCWD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Tingting Rao, Yixin Su, Peng Xu 0003, Yubo Zheng, Wei Wang, Hai Jin 0001 You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults. Search on Bibsonomy ESORICS (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Kyungchan Lim, Joshua H. Kang, Matthew Dixson, Hyungjoon Koo, Doowon Kim Evaluating Password Composition Policy and Password Meters of Popular Websites. Search on Bibsonomy SP (Workshops) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Anuraj Singh, Sumit Raj Securing password using dynamic password policy generator algorithm. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Yaqoob Al-Slais, Wael M. El-Medany User-centric adaptive password policies to combat password fatigue. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Ebu Yusuf Güven, Ali Boyaci, Muhammed Ali Aydin A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Wenhan Jia Analysis on Password Attack Model and Password Generation. Search on Bibsonomy CIPAE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Yasmeen Abdrabou, Johannes Schütte, Ahmed Shams, Ken Pfeuffer, Daniel Buschek, Mohamed Khamis, Florian Alt "Your Eyes Tell You Have Used This Password Before": Identifying Password Reuse from Gaze and Keystroke Dynamics. Search on Bibsonomy CHI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Miguel Grilo, João Campos, João F. Ferreira 0001, José Bacelar Almeida, Alexandra Mendes Verified Password Generation from Password Composition Policies. Search on Bibsonomy IFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Anuj Gautam, Shan Lalani, Scott Ruoti Improving Password Generation Through the Design of a Password Composition Policy Description Language. Search on Bibsonomy SOUPS @ USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
23Aiswarya R, Jayasree Raveendran, Vijayanand Banahatti Behavioral attributes in password reuse: Analysis of password practices in work and personal spaces. Search on Bibsonomy IndiaHCI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Poulami Das 0003, Julia Hesse, Anja Lehmann DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password. Search on Bibsonomy AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Zuwaina Alkhyeli, Ayesha Alshehhi, Mazna Alhemeiri, Salma Aldhanhani, Khalil AlBalushi, Fatima Ali AlNuaimi, Abdelkader Nasreddine Belkacem Secure Password Using EEG-based BrainPrint System: Unlock Smartphone Password Using Brain-Computer Interface Technology. Search on Bibsonomy BIBM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Alessia Michela Di Campi, Riccardo Focardi, Flaminia L. Luccio The Revenge of Password Crackers: Automated Training of Password Cracking Tools. Search on Bibsonomy ESORICS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23S. Vaithyasubramanian, R. Sundararajan State space classification of Markov password - an alphanumeric password authentication scheme for secure communication in cloud computing. Search on Bibsonomy Int. J. Pervasive Comput. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Miguel Grilo, João F. Ferreira 0001, José Bacelar Almeida Towards Formal Verification of Password Generation Algorithms used in Password Managers. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Pyung Kim, Younho Lee, Youn-Sik Hong, Taekyoung Kwon 0002 A Password Meter without Password Exposure. Search on Bibsonomy Sensors The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Ming Xu 0006, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang 0006, Weili Han Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations. Search on Bibsonomy CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Fabian Sterk, Andreas Heinemann It is not as simple as that: Playing out password security trainings in order to nudge password changes. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Hyeonhak Jeong, Hyunggu Jung MonoPass: A Password Manager without Master Password Authentication. Search on Bibsonomy IUI Companion The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk A hidden-password online password manager. Search on Bibsonomy SAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Wenjie Bai, Jeremiah Blocki, Benjamin Harsha Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking. Search on Bibsonomy GameSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Yasmeen Abdrabou, Yomna Abdelrahman, Mohamed Khamis, Florian Alt Think Harder! Investigating the Effect of Password Strength on Cognitive Load during Password Creation. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Eric Busia Blancaflor, Michael Rafael A. Dela Cruz, Jeptha Mathan V. Espanola, Luis Rafael V. Laurena, John Wendell J. Maranan, Marjun Gil D. Pinza Password Strength Assessment on a Laptop Device using an Online Password Recovery Tool - Cain & Abel. Search on Bibsonomy ICMECG The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Verena Zimmermann, Nina Gerber The password is dead, long live the password - A laboratory study on user perceptions of authentication schemes. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Rachit Rawat, Mahabir Prasad Jhanwar PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Yimin Guo 0001, Zhenfeng Zhang, Yajun Guo Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435]. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Yimin Guo 0001, Zhenfeng Zhang Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518]. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Sungyup Nam, Seungho Jeon, Hongkyo Kim, Jongsub Moon Recurrent GANs Password Cracker For IoT Password Security Enhancement. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Laheem Khan, Kovila P. L. Coopamootoo, Magdalene Ng Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Otto Hans-Martin Lutz, Jacob Leon Kröger, Manuel Schneiderbauer, Jan Maria Kopankiewicz, Manfred Hauswirth, Thomas Hermann 0001 That password doesn't sound right: interactive password strength sonification. Search on Bibsonomy Audio Mostly Conference The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Rachit Rawat, Mahabir Prasad Jhanwar PAS-TA-U: PASsword-Based Threshold Authentication with Password Update. Search on Bibsonomy SPACE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 3269 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license