The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for password with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1986 (15) 1987-1989 (15) 1990-1993 (21) 1994-1995 (17) 1996-1997 (18) 1998-1999 (30) 2000 (27) 2001 (38) 2002 (38) 2003 (70) 2004 (106) 2005 (159) 2006 (182) 2007 (160) 2008 (176) 2009 (154) 2010 (123) 2011 (122) 2012 (118) 2013 (148) 2014 (151) 2015 (150) 2016 (145) 2017 (186) 2018 (163) 2019 (155) 2020 (160) 2021 (151) 2022 (124) 2023 (123) 2024 (24)
Publication types (Num. hits)
article(1329) book(1) incollection(8) inproceedings(1898) phdthesis(33)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1427 occurrences of 503 keywords

Results
Found 3269 publication records. Showing 3269 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Yossef Oren, Adi Shamir Remote Password Extraction from RFID Tags. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sidechannel attacks, RFID, cryptanalysis, power analysis
20Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Chun-Li Lin, Ching-Po Hung Masquerade on One-Time Password Authentication Scheme. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Ratna Dutta Overcome Weakness of a Password-Based Group Key Agreement Protocol. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sonia Chiasson, Paul C. van Oorschot, Robert Biddle Graphical Password Authentication Using Cued Click Points. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, User Study, Computer Security, Usable Security, Graphical Passwords
20Rosario Gennaro, Yehuda Lindell A framework for password-based authenticated key exchange1. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF projective hash functions, authentication, Passwords, dictionary attack
20Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ilsun You A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han Using One-Time Password Based Authentication for Wireless IP Network. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Miao Ma Mitigating Denial of Service Attacks with Password Puzzles. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Philip D. MacKenzie, Sarvar Patel Hard Bits of the Discrete Log with Applications to Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Chin-Chen Chang 0001, Jui-Yi Kuo An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Rosario Gennaro, Yehuda Lindell A Framework for Password-Based Authenticated Key Exchange. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Panu Hämäläinen, Marko Hännikäinen, Markku Niemi, Timo Hämäläinen 0001 Performance evaluation of Secure Remote Password protocol. Search on Bibsonomy ISCAS (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Jonathan Katz, Rafail Ostrovsky, Moti Yung Forward Secrecy in Password-Only Key Exchange Protocols. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Colin Boyd, Paul Montague, Khanh Quoc Nguyen Elliptic Curve Based Password Authenticated Key Exchange Protocols. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Philip D. MacKenzie More Efficient Password-Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20David A. Wagner 0001, Ian Goldberg Proofs of Security for the Unix Password Hashing Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Matthew Canton The presence table: a reactive surface for ambient connection. Search on Bibsonomy TEI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Elizabeth Stobert Usability and strength in click-based graphical passwords. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF authentication, usable security, graphical passwords
16Dinei A. F. Florêncio, Cormac Herley Where do security policies come from? Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin Privacy amplification with asymptotically optimal entropy loss. Search on Bibsonomy STOC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF entropy loss, information-theoretic key agreement, privacy amplification
16Rubén Vera-Rodríguez, John S. D. Mason, Nicholas W. D. Evans Automatic Cross-Biometric Footstep Database Labelling Using Speaker Recognition. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Automatic database labelling, score normalisation, footstep biometric, speaker verification, multimodal biometrics
16Yang Jian An Improved Scheme of Single Sign-on Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Shlomi Dolev, Marina Kopeetsky Anonymous Transactions in Computer Networks. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Michel Abdalla, Céline Chevalier, David Pointcheval Smooth Projective Hashing for Conditionally Extractable Commitments. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Tong-Lee Lim, Tieyan Li Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Cormac Herley, Dinei A. F. Florêncio Protecting Financial Institutions from Brute-Force Attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jeheon Han, Jonghoon Kwon, Heejo Lee HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Alain Forget Helping users create and remember more secure text passwords. Search on Bibsonomy BCS HCI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, games, memory, computer security, passwords, persuasion, usable security
16Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot Influencing users towards better passwords: persuasive cued click-points. Search on Bibsonomy BCS HCI (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF persuasive technology, usable security, graphical passwords
16T. Rakesh Kumar, S. V. Raghavan PassPattern System (PPS): A Pattern-Based User Authentication Scheme. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, User Authentication
16Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL
16Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle Persuasion for Stronger Passwords: Motivation and Pilot Study. Search on Bibsonomy PERSUASIVE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, computer security, passwords, Persuasive Technology, usable security
16Jian Wang, Haihang Wang, Chengxiang Tan Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Golnaz Elahi, Zeev Lieber, Eric S. K. Yu Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Beatriz Porras, Jose A. Cordon, Juan Manuel Olazábal, Cecilia Valero, Elena Álvarez, Laura Bravo, Begoña Sanchez, Alberto Gutierrez, Angela Nuez, Segundo Polanco, Ana Garcia LEMAT: A Project for Innovation in Teaching Mathematics. Search on Bibsonomy ICALT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Amitava Das, Ohil K. Manyam, Makarand Tapaswi Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles. Search on Bibsonomy ICVGIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Sukanya Suwisuthikasem, Songsri Tangsripairoj E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tax Invoice, Web Services
16Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig Use Your Illusion: secure authentication usable anywhere. Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distortion, graphical passwords, social engineering
16Paul Dunphy, James Nicholson, Patrick Olivier Securing passfaces for description. Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF passfaces, graphical passwords, description
16Xiaofeng Wang, Nanning Zheng 0001 ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jongpil Jeong, Min Young Chung, Hyunseung Choo Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Malika Izabachène, David Pointcheval New Anonymity Notions for Identity-Based Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hiroshi Dozono, Masanori Nakakuni An integration method of multi-modal biometrics using supervised pareto learning self organizing maps. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Youngsook Lee, Junghyun Nam, Dongho Won Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed system, smart card, impersonation attack, authentication scheme
16Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera Extracting Kerberos passwords through RC4-HMAC encryption type analysis. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger New Side Channels Targeted at Passwords. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Eylem Kiliç "My Money in E-Purse" Searching Problems in Self Service User Interface. Search on Bibsonomy HCI (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-community, Interface design, age
16Sarah Guth Wikis in education: : is public better? Search on Bibsonomy Int. Sym. Wikis The full citation details ... 2007 DBLP  DOI  BibTeX  RDF blended course development, collective authoring, public wiki
16Imad M. Abbadi Digital Rights Management Using a Master Control Device. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith TwoKind authentication: usable authenticators for untrustworthy environments. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim Modeling cryptographic properties of voice and voice-based entity authentication. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF modeling human factors, biometrics, voice, entity authentication
16Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 Using the mobile phone as a security token for unified authentication. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentcation, mobility
16David Argles, Alex Pease, Robert John Walters An Improved Approach to Secure Authentication and Signing. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner Secure Identification and QKD in the Bounded-Quantum-Storage Model. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Oded Goldreich 0001, Yehuda Lindell Session-Key Generation Using Human Passwords Only. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Andrew Teoh Beng Jin, Alwyn Goh, David Ngo Chek Ling Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF BioHashing, random multispace quantization, face recognition, Cancellable biometrics
16Jean-Camille Birget, Dawei Hong, Nasir D. Memon Graphical passwords based on robust discretization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Massimo Merro, Matthew Hennessy A bisimulation-based semantic theory of Safe Ambients. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed systems, Mobile agents, bisimulation
16Maria Teresa Carta, Daniele D. Giusto, Cristian Perra, Barbara Podda Exploiting JPEG2000 and Jpip for Image Based Authentication. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Woojin Chang Keystroke Biometric System Using Wavelets. Search on Bibsonomy ICB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Keystroke Biometric System, Key- stroke Authentication, Discrete Wavelet Transform, Keystroke Dynamics
16Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters Forward-secure signatures with untrusted update. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF untrusted storage, digital signatures, forward security, two-factor authentication
16Vladimir Kolesnikov, Charles Rackoff Key Exchange Using Passwords and Long Keys. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Marco Pistoia, Francesco Logozzo Program Analysis for Security and Privacy. Search on Bibsonomy ECOOP Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Kirk H. M. Wong, Yuan Zheng 0001, Jiannong Cao 0001, Shengwei Wang A Dynamic User Authentication Scheme for Wireless Sensor Networks. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.15.4 Specification, Security, Sensor Networks, User Authentication
16Nick Bartlow, Bojan Cukic Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Dingju Zhu, Jianping Fan 0002 An Introduction to Aggregation Grid. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Michiru Tanaka, Yoshimi Teshigawara A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16A. Sermet Anagun Development of Committee Neural Network for Computer Access Security System. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16SeongHan Shin, Kazukuni Kobara, Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16SeongHan Shin, Kazukuni Kobara, Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam CredEx: User-Centric Credential Management for Grid and Web Services. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Mike Bazakos, Yunqian Ma, Andrew H. Johnson Fast access control technology solutions (FACTS). Search on Bibsonomy AVSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Rachna Dhamija, J. Doug Tygar The battle against phishing: Dynamic Security Skins. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Serge Vaudenay Secure Communications over Insecure Channels Based on Short Authenticated Strings. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen Graphical Passwords: A Survey. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao 0001 Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Wireless Networks, Access Control, Security Protocol
16Alen Peacock, Xian Ke, Matthew Wilkerson Typing Patterns: A Key to User Identification. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Keystroke, Security, Pattern Recognition, Authentication, Authentication, Biometrics, Typing, Intellectual Property, User Authentication, network-level security and protection, Security and Privacy Protection, User Identification
16Chun-Nam Chun, Ronald Chung Iris Recognition for Palm-Top Application. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Emmanuel Bresson, Olivier Chevassut, David Pointcheval New Security Results on Encrypted Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Scott J. Harper, Peter M. Athanas A Security Policy Based upon Hardware Encryption. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Yong-Guk Kim, Taekyoung Kwon 0002 An Authentication Scheme Based Upon Face Recognition for the Mobile Environment. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Philip D. MacKenzie, Michael K. Reiter Networked cryptographic devices resilient to capture. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices
16Enzhe Yu, Sungzoon Cho Novelty Detection Approach for Keystroke Dynamics Identity Verification. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Sanghoon Song, Taekyoung Kwon 0002, Ki Song Yoon Practical Security Improvement of PKCS#5. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Jonathan Katz Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Seung Bae Park, Moon Seol Kang, Sang Jun Lee Authenticated Key Exchange Protocol Secure against Offline Dictionary Attack and Server Compromise. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Ren-Junn Hwang, Rong-Chi Chang Key Agreement in Ad Hoc Networks. Search on Bibsonomy ISPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Benny Pinkas, Tomas Sander Securing passwords against dictionary attacks. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Taekyoung Kwon 0002 Virtual Software Tokens - A Practical Way to Secure PKI Roaming. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Sean Stockburger, Teresa Fernandez Virtual onsite support: using internet chat and remote control to improve customer service. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF lotus, sametime, technology, support, help desk, remote control
16Emmanuel Bresson, Olivier Chevassut, David Pointcheval Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Joseph Goldberg, Jennifer Hagman, Vibha Sazawal Doodling our way to better authentication. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2002 DBLP  DOI  BibTeX  RDF passdoodles, authentication, user study, passwords
16Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel Cryptographic Key Generation from Voice. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Philip D. MacKenzie, Michael K. Reiter Networked Cryptographic Devices Resilient to Capture. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Oded Goldreich 0001, Yehuda Lindell Session-Key Generation Using Human Passwords Only. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 3269 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license