The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for password with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1986 (15) 1987-1989 (15) 1990-1993 (21) 1994-1995 (17) 1996-1997 (18) 1998-1999 (30) 2000 (27) 2001 (38) 2002 (38) 2003 (70) 2004 (106) 2005 (159) 2006 (182) 2007 (160) 2008 (176) 2009 (154) 2010 (123) 2011 (122) 2012 (118) 2013 (148) 2014 (151) 2015 (150) 2016 (145) 2017 (186) 2018 (163) 2019 (155) 2020 (160) 2021 (151) 2022 (124) 2023 (123) 2024 (24)
Publication types (Num. hits)
article(1329) book(1) incollection(8) inproceedings(1898) phdthesis(33)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1427 occurrences of 503 keywords

Results
Found 3269 publication records. Showing 3269 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Sean Oesch, Scott Ruoti That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2020 DBLP  BibTeX  RDF
23Tao Zhang, Zelei Cheng, Yi Qin, Qiang Li, Lin Shi Deep Learning for Password Guessing and Password Strength Evaluation, A Survey. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Tatiana Bradley Password Authenticated Key Exchange Variants for Practical Password Security. Search on Bibsonomy 2020   RDF
23Hananeh Salehifar, Peyman Bayat, Mojtaba Amiri Majd Eye gesture blink password: a new authentication system with high memorable and maximum password length. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Sean Oesch, Scott Ruoti That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
23Jeffrey P. Kaleta, Jong Seok Lee, Sungjin Yoo Nudging with construal level theory to improve online password use and intended password choice. Search on Bibsonomy Inf. Technol. People The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Cameron R. Schafer, Lei Pan 0002 Password Strength Estimators Trained on the Leaked Password Lists. Search on Bibsonomy ATIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Pierre Jourdan, Eliana Stavrou Towards Designing Advanced Password Cracking Toolkits: Optimizing the Password Cracking Process. Search on Bibsonomy UMAP (Adjunct Publication) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Gelei Deng, Xingjie Yu, Huaqun Guo Efficient Password Guessing Based on a Password Segmentation Approach. Search on Bibsonomy GLOBECOM The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, Matthew Smith 0001 "If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers. Search on Bibsonomy CHI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Taku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka Password Strength Measurement without Password Disclosure. Search on Bibsonomy AsiaJCIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Mashael AlSabah, Gabriele Oligeri, Ryan Riley Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
23Yimin Guo 0001, Zhenfeng Zhang LPSE: Lightweight password-strength estimation for password meters. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Mashael AlSabah, Gabriele Oligeri, Ryan Riley Your culture is in your password: An analysis of a demographically-diverse password dataset. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur "What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Nancy Mogire, Michael-Brian Ogawa, Randall K. Minas, Brent Auernheimer, Martha E. Crosby Forget the Password: Password Memory and Security Applications of Augmented Cognition. Search on Bibsonomy HCI (16) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Christina P. Katsini, Christos Fidas, George E. Raptis, Marios Belk, George Samaras, Nikolaos M. Avouris Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition. Search on Bibsonomy CHI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Giannis Tzagarakis, Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos Øpass: Zero-storage Password Management Based on Password Reminders. Search on Bibsonomy EuroSec@EuroSys The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Pieris Tsokkis, Eliana Stavrou A password generator tool to increase users' awareness on bad password construction strategies. Search on Bibsonomy ISNCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Ting Yi Chang, Min-Shiang Hwang, Chou Chen Yang Password Authenticated Key Exchange and Protected Password Change Protocols. Search on Bibsonomy Symmetry The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Conor T. McLennan, Philip Manning, Samantha E. Tuft An evaluation of the Game Changer Password System: A new approach to password security. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Nouf Aljaffan, Haiyue Yuan, Shujun Li PSV (Password Security Visualizer): From Password Checking to User Education. Search on Bibsonomy HCI (22) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Tobias Seitz, Manuel Hartmann, Jakob Pfab, Samuel Souque Do Differences in Password Policies Prevent Password Reuse? Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Jun Ho Huh, Hyoungshick Kim, Swathi S. V. P. Rayala, Rakesh B. Bobba, Konstantin Beznosov I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails. Search on Bibsonomy CHI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Jian Shen 0001, Meng Feng, Dengzhi Liu, Chen Wang 0015, Jiachen Jiang, Xingming Sun Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Warut Khern-am-nuai, Weining Yang, Ninghui Li Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
23Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Paul Biocco, Mohd Anwar Grid Framework to Address Password Memorability Issues and Offline Password Attacks. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Nouf Aljaffan Password security and usability: from password checkers to a new framework for user authentication. Search on Bibsonomy 2017   RDF
23Franziskus Kiefer, Mark Manulis Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols. Search on Bibsonomy ISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari Comparing Password Ranking Algorithms on Real-World Password Datasets. Search on Bibsonomy ESORICS (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Mohammad Sabzinejad Farash, SK Hafizul Islam, Mohammad S. Obaidat A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Moritz Horsch, Andreas Hülsing, Johannes Buchmann 0001 PALPAS - PAssword Less PAssword Synchronization. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Weizhi Meng 0001 RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Jeffrey L. Jenkins, G. Mark Grimes, Jeffrey Gainer Proudfoot, Paul Benjamin Lowry Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Search on Bibsonomy Inf. Technol. Dev. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Xiangxue Li, Haifeng Qian, Yu Yu 0001, Jian Weng 0001, Ziping Wang Robust password changing and DoS resilience for human-centric password authentication. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
23Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song The Emperor's New Password Manager: Security Analysis of Web-based Password Managers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2014 DBLP  BibTeX  RDF
23Yang Cheng, Zhao Qi How to Set and Manage Your Network Password: A Multidimensional Scheme of Password Reuse. Search on Bibsonomy I3E The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Nattawut Phetmak, Wason Liwlompaisan, Pruet Boonma Travel Password: A Secure and Memorable Password Scheme. Search on Bibsonomy ACIIDS (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers. Search on Bibsonomy PASSWORDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Hung-Yu Chien, Tzong-Chen Wu, Ming-Kuei Yeh Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2013 DBLP  BibTeX  RDF
23Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Givon Zirkind One Time Pad Password Protection: Using T.E.C. Steganography and Secure Password Transmission Protocols. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
23Raul Gonzalez, Eric Yawei Chen, Collin Jackson Automated Password Extraction Attack on Modern Password Managers. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
23Mark Ciampa A comparison of password feedback mechanisms and their impact on password entropy. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle Password advice shouldn't be boring: Visualizing password guessing attacks. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2012 DBLP  BibTeX  RDF
23Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio López Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Kirsi Helkala Password Education Based on Guidelines Tailored to Different Password Categories. Search on Bibsonomy J. Comput. The full citation details ... 2011 DBLP  BibTeX  RDF
23Sören Preibusch, Joseph Bonneau The Password Game: Negative Externalities from Weak Password Practices. Search on Bibsonomy GameSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Wanli Ma, John Campbell 0001, Dat Tran 0001, Dale Kleeman Password Entropy and Password Quality. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Nils Gruschka, Luigi Lo Iacono Password Visualization beyond Password Masking. Search on Bibsonomy INC The full citation details ... 2010 DBLP  BibTeX  RDF
23Andreas Pashalidis Accessing Password-Protected Resources without the Password. Search on Bibsonomy CSIE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Jeannette Kelley Examining the Role of Organizational Password Security Policies in Individual Password Security Behaviors. Search on Bibsonomy AMCIS The full citation details ... 2006 DBLP  BibTeX  RDF
23Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger Password Exhaustion: Predicting the End of Password Usefulness. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Kyungah Shim Off-line password-guessing attacks on the generalized key agreement and password authentication protocol. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Chun-Li Lin, Tzonelih Hwang A password authentication scheme with secure password updating. Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Michael M. Swift, Jonathan T. Trostle, John Brezak Microsoft Windows 2000 Kerberos Change Password and Set Password Protocols. Search on Bibsonomy RFC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Gwoboa Horng Password Authentication Without Using a Password Table. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
21Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh An improvement of Xu et al.'s authentication scheme using smart cards. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cryptography, network security, smart card, hash function, password, authentication protocol
21Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles An information security ontology incorporating human-behavioural implications. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF human behavioural implications, information security ontology, password policy
21Deborah Nelson, Kim-Phuong L. Vu Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords. Search on Bibsonomy HCI (8) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF memory training programs, retrieval strategies, passwords, mnemonics, proactive password checking
21Helena Rifà-Pous A Secure Mobile-Based Authentication System for e-Banking. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF challenge-response authentication, attacks, mobile security, One-time password
21Waseem Daher, Ran Canetti POSH: a generalized captcha with security applications. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF puzzles, password security
21Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key
21Manik Lal Das, V. Lakshmi Narasimhan EARS: Efficient Entity Authentication in Remote Systems. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Hash function, Password
21Markus Jakobsson, Liu Yang, Susanne Wetzel Quantifying the security of preference-based authentication. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF password reset, preference-based authentication, security question, simulation
21Weijia Wang, Lei Hu, Yong Li 0002 Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
21Eun-Jun Yoon, Kee-Young Yoo Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart card, Password, Key agreement
21Lin Yang, Xinghua Ruan, Jingdong Xu, Gongyi Wu Secure Enterprise Information Systems: A Mutual Authentication Scheme for Roaming Users Using Memorable Information. Search on Bibsonomy CONFENIS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Trust, Password, Enterprise information systems, Identity-based cryptography, Mutual authentication
21Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Secure Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement
21Paul C. van Oorschot, Stuart G. Stubblebine On countering online dictionary attacks with login histories and humans-in-the-loop. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mandatory human participation schemes, online dictionary attacks, password protocols, usable security, relay attack
21Yigael Berger, Avishai Wool, Arie Yeredor Dictionary attacks using keyboard acoustic emanations. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF keyboard acoustics, password cracking, dictionary attacks
21Eun-Jun Yoon, Kee-Young Yoo An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Network security, Smart card, Password
21Eun-Jun Yoon, Kee-Young Yoo Enhanced Forward-Secure User Authentication Scheme with Smart Cards. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Network security, Smart card, Secure protocol, Password
21Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy
21Youngsook Lee, Junghyun Nam, Dongho Won Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF parallel session attack, smart card, password, Authentication scheme, reflection attack
21Eun-Jun Yoon, Kee-Young Yoo Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Dynamic ID, Authentication, Smart card, Password, Reflection attack
21Eun-Jun Yoon, Kee-Young Yoo Efficient Mutual Authentication Scheme with Smart Card. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Network security, Smart card, Secure protocol, Password
21Furkan Tari, A. Ant Ozok, Stephen H. Holden A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security
21Xia Brustoloni, José Carlos Brustoloni Hardening Web browsers against man-in-the-middle and eavesdropping attacks. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack
21Eun-Jun Yoon, Kee-Young Yoo Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Password, Key establishment, Forward Secrecy
21Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim 0001, Kee-Young Yoo Parallizable simple authenticated key agreement protocol . Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptography, key agreement, key exchange, password authentication
21Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim 0001, Kee-Young Yoo Parallizable simple authenticated key agreement protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptography, key agreement, key exchange, password authentication
21Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang A flexible remote user authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, authentication, cryptography, password
21Chooi-Tian Lee, Jack W. Harris Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program
21Tsutomu Matsumoto, Hideki Imai Human Identification Through Insecure Channel. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Identification Verification, IC Card, Insecure Channel, Authentication, Access Control, Cryptography, Smart Card, Password, Human Interface, Human Identification, User Identification
20Andrea Bianchi, Ian Oakley, Dong-Soo Kwon The secure haptic keypad: a tactile password system. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pin entry, tactile ui, security, user study
20Shaojian Zhu, Yao Ma, Jinjuan Feng, Andrew Sears Don't listen! I am dictating my password! Search on Bibsonomy ASSETS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, speech technology, physical impairment
20Jonathan Katz, Vinod Vaikuntanathan Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Simon Marechal Advances in password cracking. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Rosario Gennaro Faster and Shorter Password-Authenticated Key Exchange. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Ming Lei, Yang Xiao 0001, Susan V. Vrbsky, Chung-Chih Li, Li Liu A Virtual Password Scheme to Protect Passwords. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Yanjiang Yang, Feng Bao 0001, Robert H. Deng Efficient Client-to-Client Password Authenticated Key Exchange. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 3269 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license