The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for password with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1986 (15) 1987-1989 (15) 1990-1993 (21) 1994-1995 (17) 1996-1997 (18) 1998-1999 (30) 2000 (27) 2001 (38) 2002 (38) 2003 (70) 2004 (106) 2005 (159) 2006 (182) 2007 (160) 2008 (176) 2009 (154) 2010 (123) 2011 (122) 2012 (118) 2013 (148) 2014 (151) 2015 (150) 2016 (145) 2017 (186) 2018 (163) 2019 (155) 2020 (160) 2021 (151) 2022 (124) 2023 (123) 2024 (24)
Publication types (Num. hits)
article(1329) book(1) incollection(8) inproceedings(1898) phdthesis(33)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1427 occurrences of 503 keywords

Results
Found 3269 publication records. Showing 3269 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Neelam Soundarajan Refining Interactions in a Distributed System. Search on Bibsonomy FAABS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Interaction refinement, Communication traces, Correctness criteria
16Douglas N. Hoover, B. N. Kausik Software Smart Cards via Cryptographic Camouflage. Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Jonathan T. Trostle Timing Attacks Against Trusted Path. Search on Bibsonomy S&P The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai On the Matsumoto and Imai's Human Identification Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
16A. H. Wadaa, Hussein M. Abdel-Wahab, John McHugh Heuristic authentication protocol for TCP/IP network applications under UNIX. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1992 DBLP  DOI  BibTeX  RDF UNIX Network Programming, Security, Distributed Systems, Authentication, Encryption, Client/Server Model, TCP/IP Protocols
16Leslie Chalmers User identification, access control, and audit requirements. Search on Bibsonomy ACM Annual Conference The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
13Xinyi Huang 0001, Yang Xiang 0001, Ashley Chonka, Jianying Zhou 0001, Robert H. Deng A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security, privacy, distributed systems, Authentication, biometrics, smart card, password
13Noriyasu Yamamoto, Toshihiko Wakahara Improvement of Encryption Processing Speed for a User Attestation System Using a Cellular Phone. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF user attestation system, two-dimensional code, password, cellular phone, digital camera
13Baber Aslam, Lei Wu, Cliff Changchun Zou PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. Search on Bibsonomy NCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF design, usability, Phishing, web security, password authentication, Pharming
13Hui-Feng Huang, Su-E. Liu, Hui-Fang Chen Designing a New Mutual Authentication Scheme Based on Nonce and Smart Cards. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF smart card, password, mutual authentication
13Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
13Bayalagmaa Davaanaym, Young-Sil Lee, Hoon-Jae Lee 0001, Sanggon Lee, Hyotaek Lim A Ping Pong Based One-Time-Passwords Authentication System. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PingPong128, Stream cipher, One time password
13Chandan Koner, C. T. Bhunia, Ujjwal Maulik An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart card. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Automatic Variable Password, Biometric Property, Remote Server, Digital Signature, Identifier
13Muhammad Khurram Khan Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, cryptanalysis, smart card, password
13Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo Brave New World: Pervasive Insecurity of Embedded Network Devices. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Router insecurity, network webcams, print servers, embedded device management interface exploitation, default password
13Stuart E. Schechter, Robert W. Reeder 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF backup authentication, password reset, authentication
13Hongfeng Zhu, Tianhua Liu, Jie Liu Robust and Simple Multi-server Authentication Protocol without Verification Table. Search on Bibsonomy HIS (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password authentication protocol, Smart card, Forward Secrecy, multi-server
13Jacob O. Wobbrock TapSongs: tapping rhythm-based passwords on a single binary sensor. Search on Bibsonomy UIST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF binary sensors, jingles, password entry, songs, temporal strings, mobile devices, user authentication, rhythm, tapping
13Raphael C.-W. Phan Security of Group Key Exchange Protocols with Different Passwords. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key indistinguishability, undetectable online dictionary attack, model, cryptanalysis, group, proof, Password-authenticated key exchange
13Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theodore Tryfonas, John May, Apostolos Traganitis A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. Search on Bibsonomy MOBILIGHT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MANET security, face-centered cubic (FCC) structure, elliptic curve cryptography, password authentication
13Hui-Feng Huang, Yi-Jia Chang, Kuo-Ching Liu An Efficient Three Party Authenticated Key Exchange for Mobile Communications. Search on Bibsonomy ISPAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Three-party key exchange, Elliptic curve cryptography, Password
13Fuw-Yi Yang, Tzung-Da Wu, Su-Hui Chiu A novel mutual authentication scheme for USB storage devices. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Diffie-Hellmen, hash functions, password, remote authentication
13Gildas Avoine, Pascal Junod, Philippe Oechslin Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hellman's time-memory trade-off, password cracking, Cryptography, rainbow tables
13Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone SC@CCO: a Graphic-Based Authentication System. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password
13Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF C2C-PAKA, password-compromise impersonate attack, Cross-Realm
13Manik Lal Das, V. Lakshmi Narasimhan Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Hash function, Password, Key agreement, Non-monotonic logic
13Markus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang Love and authentication. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF entry error, security question, security, password, reset
13Eun-Jun Yoon, Kee-Young Yoo Enhanced Three-Round Smart Card-Based Key Exchange Protocol. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Cryptanalysis, Smart card, Password, Key exchange
13Chin-Chen Chang 0001, Jung-San Lee, Ting-Fang Cheng Security design for three-party encrypted key exchange protocol using smart cards. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 3PEKE, off-line password guessing attack, communications, smart cards
13Chunbo Ma, Jun Ao, Jianhua Li 0001 A Novel Verifier-Based Authenticated Key Agreement Protocol. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Two-Party, Password, Key Agreement, Verifier
13Eun-Jun Yoon, Kee-Young Yoo Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Three-party, Authentication, Cryptography, Password, Key agreement, Token
13José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
13Chin-Chen Chang 0001, Chia-Chi Wu A Novel Key Agreement Scheme in a Multiple Server Environment. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, password, Key agreement, multi-server, remote authentication
13Bruce Schneier Authentication and Expiration. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF username and password, authentication, e-commerce
13Wei-Chi Ku, Shuai-Min Chen Cryptanalysis of a flexible remote user authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privileged insider's attack, reparability, user eviction, authentication, password
13E. Axel Larsson A case study: implementing novell identity management at Drew University. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DirXML, eDirectory, identity management, single sign on, directory services, active directory, novell, password management
13Özer Aydemir, Ali Aydin Selçuk A Strong User Authentication Protocol for GSM. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strong password protocols, GSM, user authentication, Wireless network security
13Mike Just Designing and Evaluating Challenge-Question Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Challenge questions, credential recovery, password recovery, user authentication
13Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo A secure user authentication scheme using hash functions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, authentication, cryptography, hash function, password
13Volker Roth 0002, Kai Richter 0002, Rene Freidinger A PIN-entry method resilient against shoulder surfing. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cognitive trapdoor games, ATM, password, PIN, shoulder surfing
11Binh Le Thanh Thai, Hidema Tanaka A statistical Markov-based password strength meter. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Guanxiong Ha, Chunfu Jia, Xiaowei Ge, Jiawei Yuan, Hang Chen, Mingyue Li Efficient and anonymous password-hardened encryption services. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Wenhao Yang, Xiwen Dengxiong, Xueting Wang, Yidan Hu, Yunbo Zhang "I Can See Your Password": A Case Study About Cybersecurity Risks in Mid-Air Interactions of Mixed Reality-Based Smart Manufacturing Applications. Search on Bibsonomy J. Comput. Inf. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Hamza Touil, Nabil El Akkad, Khalid Satori, Naglaa F. Soliman, Walid El-Shafai Efficient Braille Transformation for Secure Password Hashing. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Kübra Seyhan, Sedat Akleylek A new lattice-based password authenticated key exchange scheme with anonymity and reusable key. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Kübra Seyhan, Sedat Akleylek, Ahmet Faruk Dursun Password authenticated key exchange-based on Kyber for mobile devices. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis Keep your memory dump shut: Unveiling data leaks in password managers. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yun Su, Mo Xi Systematic Solutions to Login and Authentication Security: A Dual-Password Login-Authentication Mechanism. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Anuj Gautam, Tarun Kumar Yadav, Kent E. Seamons, Scott Ruoti Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Min Jin, Junbin Ye, Rongxuan Shen, Huaxiang Lu Search-based Ordered Password Generation of Autoregressive Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Erqiang Zhou, Yejian Peng, Guanghui Shao, Fuhu Deng, Yurun Miao, Wulong Fan Password cracking using chunk similarity. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yaqing Song, Chunxiang Xu, Yuan Zhang 0006, Shiyu Li Hardening Password-Based Credential Databases. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11You Lyu, Shengli Liu 0001, Shuai Han 0001 Universal Composable Password Authenticated Key Exchange for the Post-Quantum World. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Sabyasachi Dutta, Partha Sarathi Roy 0001, Reihaneh Safavi-Naini, Willy Susilo Password Protected Universal Thresholdizer. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Charlotte Lefevre, Bart Mennink Permutation-Based Hash Chains with Application to Password Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Naomi Woods, Mikko T. Siponen How memory anxiety can influence password security behavior. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jaehyuk Lee, Wonbin Jeong, Kyungroul Lee Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Konstantinos Karampidis Exploiting multimodal biometrics for enhancing password security. Search on Bibsonomy Log. J. IGPL The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Harika Lingamsetty, N. Surya Sri Nitya, Bala Mani Teja M, Vanga Odelu, Srijanee Mookherji, KG Raghavendra Narayan, Rajendra Prasath, Alavalapati Goutham Reddy A Penalty-Based Entropy Driven Universal Password Strength for Lightweight Devices. Search on Bibsonomy COMSNETS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11You Lyu, Shengli Liu 0001, Shuai Han 0001 Universal Composable Password Authenticated Key Exchange for the Post-Quantum World. Search on Bibsonomy EUROCRYPT (6) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Juarez Oliveira, Altair O. Santin, Eduardo Viegas 0001, Pedro Horchulhack A Non-interactive One-Time Password-Based Method to Enhance the Vault Security. Search on Bibsonomy AINA (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Lina Zhou, Kanlun Wang, Jianwei Lai, Dongsong Zhang A Comparison of a Touch-Gesture- and a Keystroke-Based Password Method: Toward Shoulder-Surfing Resistant Mobile User Authentication. Search on Bibsonomy IEEE Trans. Hum. Mach. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hui Cui 0001, Zhiguo Wan, Huayi Qi, Baodong Qin, Xun Yi Password-authenticated proofs of retrievability for multiple devices checking cloud data. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yunxia Han, Chunxiang Xu, Shanshan Li 0004, Changsong Jiang, Kefei Chen ttPAKE: Typo tolerance password-authenticated key exchange. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Aikaterini Kanta, Iwen Coisel, Mark Scanlon Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Peixin Ren, Xiaozhuo Gu, Ziliang Wang Efficient module learning with errors-based post-quantum password-authenticated key exchange. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11K. S. Kuppusamy, Balayogi G Accessible password strength assessment method for visually challenged users. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Panagiotis Andriotis, Myles Kirby, Atsuhiro Takasu Bu-Dash: a universal and dynamic graphical password scheme (extended version). Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Norman Ignatius Dias, Mouleeswaran Singanallur Kumaresan, Reeja Sundaran Rajakumari Deep learning based graphical password authentication approach against shoulder-surfing attacks. Search on Bibsonomy Multiagent Grid Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Huanhuan Lian, Yafang Yang, Yunlei Zhao Efficient and Strong Symmetric Password Authenticated Key Exchange With Identity Privacy for IoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11E. Praveen Kumar, S. Priyanka A password less authentication protocol for multi-server environment using physical unclonable function. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kübra Seyhan, Sedat Akleylek A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11M. I. Mary Metilda, D. Lalitha, S. Vaithyasubramanian Data security-web login authentication process using password generating tile array token interval timed coloured Petri nets. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ioannis Kafetzis, Lazaros Moysis, Aleksandra Tutueva, Denis N. Butusov, Hector E. Nistazakis, Christos K. Volos A 1D coupled hyperbolic tangent chaotic map with delay and its application to password generation. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hakan Bostan, Atila Bostan Shoulder surfing resistant graphical password schema: Randomized Pass Points (RPP). Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Songhui Guo, Yunfan Song, Song Guo, Yeming Yang, Shuaichao Song Three-Party Password Authentication and Key Exchange Protocol Based on MLWE. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Seok Jun Kim, Byung Mun Lee Multi-Class Classification Prediction Model for Password Strength Based on Deep Learning. Search on Bibsonomy J. Multim. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Warut Khern-am-nuai, Matthew J. Hashim, Alain Pinsonneault, Weining Yang, Ninghui Li Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zhengjun Cao A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services". Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Assumpta Ezugwu, Elochukwu A. Ukwandu, Celestine Ugwu, Modesta Ezema, Comfort Olebara, Juliana Ndunagu, Lizzy Ofusori, Uchenna Ome Password-Based Authentication and The Experiences of End Users. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ruthu Hulikal Rooparaghunath, T. S. Harikrishnan, Debayan Gupta Trenchcoat: Human-Computable Hashing Algorithms for Password Generation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe PiXi: Password Inspiration by Exploring Information. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hassan Wasfi, Richard Stone The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yangde Wang, Weidong Qiu, Weicheng Zhang, Hao Tian, Shujun Li SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Etienne Salimbeni, Nina Mainusch, Dario Pasquini Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tunde Oduguwa, Abdullahi Arabo A Review of Password-less User Authentication Schemes. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Vivek Nair, Dawn Song MFDPG: Multi-Factor Authenticated Password Management With Zero Stored Secrets. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang 0001, Jun Luo 0001 Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Javier Rando, Fernando Pérez-Cruz, Briland Hitaj PassGPT: Password Modeling and (Guided) Generation with Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rui Xin, Shihan Lin, Xiaowei Yang 0001 Quantifying User Password Exposure to Third-Party CDNs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suood Alroomi, Frank Li 0001 Measuring Website Password Creation Policies At Scale. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yaping Wu, Xili Wan, Xinjie Guan, Tingxiang Ji, Feng Ye PGTCN: A novel password-guessing model based on temporal convolution network. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yongtao Luo, Bo Yang 0023, Jie Liu 0002, Ruibo Wang, Jinmin Wen, Tiaojie Xiao, Xuguang Chen, Chunye Gong MT-office: parallel password recovery program for office on domestic heterogeneous multi-core processor. Search on Bibsonomy CCF Trans. High Perform. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Watson Ladd SPAKE2, a Password-Authenticated Key Exchange. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tim Taubert, Christopher A. Wood SPAKE2+, an Augmented Password-Authenticated Key Exchange (PAKE) Protocol. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wenting Li, Ping Wang 0003, Kaitai Liang HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 3269 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license