The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for password with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1986 (15) 1987-1989 (15) 1990-1993 (20) 1994-1995 (17) 1996-1997 (18) 1998-1999 (29) 2000 (27) 2001 (38) 2002 (36) 2003 (70) 2004 (105) 2005 (160) 2006 (182) 2007 (160) 2008 (176) 2009 (153) 2010 (121) 2011 (120) 2012 (118) 2013 (145) 2014 (147) 2015 (142) 2016 (136) 2017 (168) 2018 (146) 2019 (19)
Publication types (Num. hits)
article(934) book(1) incollection(8) inproceedings(1523) phdthesis(17)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1427 occurrences of 503 keywords

Results
Found 2483 publication records. Showing 2483 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
206Michael Luby, Charles Rackoff A Study of Password Security. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
122Joseph Chee Ming Teo, Chik How Tan Denial-of-service resilience password-based group key agreement for wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service, group key agreement, secure group communication, password-based authentication
117Jae Hyung Koo, Dong Hoon Lee Secure Password Pocket for Distributed Web Services. Search on Bibsonomy NPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
117IkSu Park, Seung Bae Park, ByeongKyun Oh User Authentication Protocol Based on Human Memorable Password and Using RSA. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication
117IkSu Park, Seung Bae Park, ByeongKyun Oh User Authentication Protocol Based on Human Memorable Password and Using RSA. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication
108Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
108J. Archer Harris OPA: A One-Time Password System. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
106Philip Inglesant, Martina Angela Sasse The true cost of unusable password policies: password use in the wild. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF password policy, passwords, usable security
104Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
100Umut Topkara, Mikhail J. Atallah, Mercan Topkara Passwords decay, words endure: secure and re-usable multiple password mnemonics. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mnemonic sentence, usability, authentication, natural language processing, passwords
97Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon Authentication using graphical passwords: effects of tolerance and image choice. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PassPoints, password images, authentication, human factors, usable security, tolerance, graphical passwords, password security
95Shirley Gaw, Edward W. Felten Password management strategies for online accounts. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password reuse, security, survey, password, user behavior, password management
95David P. Jablon Extended Password Key Exchange Protocols Immune to Dictionary Attacks. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF extended password key exchange protocols, stored password-verifier, Simple Password Exponential Key Exchange, intranet use, Internet, Internet, authentication, dictionary attack
93Khaled Alghathbar, Hanan A. Mahmoud Noisy password scheme: A new one time password system. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
93Paul C. van Oorschot, Julie Thorpe On predictive models and user-drawn graphical passwords. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Draw-a-Secret, graphical dictionary, memorable passwords, modeling user choice, password complexity factors, Graphical passwords, dictionary attack
93Youngsook Lee, Junghyun Nam, Dongho Won An Inter-domain Key Agreement Protocol Using Weak Passwords. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, password, Key exchange, public key
91Huanyu Zhao, Xiaolin Li 0001 S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
88Saeed Rajput, Jihong Chen, Sam Hsu State based authentication. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management
86Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson Threshold Password-Authenticated Key Exchange. Search on Bibsonomy J. Cryptology The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key exchange, Password authentication, Dictionary attack, Threshold cryptosystems
84Ronald Pose Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
82Timothy W. van der Horst, Kent E. Seamons pwdArmor: Protecting Conventional Password-Based Authentications. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
82Eun-Ser Lee, Haeng-Kon Kim, Sang Ho Lee Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
82Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri Neural Network Techniques for Proactive Password Checking. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF neural networks, machine learning, access control, passwords, System security
82SangJun Lee, SeungBae Park Mobile Password System for Enhancing Usability-Guaranteed Security in Mobile Phone Banking. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
82Yanjiang Yang, Robert H. Deng, Feng Bao 0001 A Practical Password-Based Two-Server Authentication and Key Exchange System. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Password system, password verification data (PVD), offline dictionary attack, key exchange, user authentication
82Eun-Jun Yoon, Kee-Young Yoo A New Simple Authenticated Key Agreement and Protected Password Change Protocol. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password change, Dffie-Hellman key agreement, Authentication, Cryptography, Password, Key agreement
82Ya-Fen Chang, Chin-Chen Chang 0001 A secure and efficient strong-password authentication protocol. Search on Bibsonomy Operating Systems Review The full citation details ... 2004 DBLP  DOI  BibTeX  RDF strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack
77Richard Shay, Elisa Bertino A comprehensive simulation tool for the analysis of password policies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Simulation, Management, Policy, Password
77Hua Wang, Yao Guo 0001, Xia Zhao, Xiangqun Chen Keep Passwords Away from Memory: Password Caching and Verification Using TPM. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF OIAP, Password Authentication, TPM
77Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino Password policy simulation and analysis. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF simulation, modeling, management, policy, password
77Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Provably secure password-based authentication in TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password authentication, TLS
77Michael Szydlo, Burton S. Kaliski Jr. Proofs for Two-Server Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concrete security reduction, secret sharing, password authentication
77Xunhua Wang, Mohammad Hossain Heydari, Hua Lin An Intrusion-Tolerant Password Authentication System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance
73Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum Client-Server Password Recovery. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Dengguo Feng, Weidong Chen Modular approach to the design and analysis of password-based security protocols. Search on Bibsonomy Science in China Series F: Information Sciences The full citation details ... 2007 DBLP  DOI  BibTeX  RDF weak computational indistinguishability, random oracle model (ROM), provable security, security protocols, standard model
73Hyunsoo Song, Taekyoung Kwon Security Analysis of Secure Password Authentication for Keystroke Dynamics. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
73Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson Threshold Password-Authenticated Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
73Victor Boyko, Philip D. MacKenzie, Sarvar Patel Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
73Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd Reducing shoulder-surfing by using gaze-based password entry. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF gaze-based password entry, password entry, eye tracking, shoulder surfing
73Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo High Dictionary Compression for Proactive Password Checking. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF password selection, access control, decision trees, proactive password checking
69Markus Jakobsson, Steven Myers Delayed password disclosure. Search on Bibsonomy SIGACT News The full citation details ... 2007 DBLP  DOI  BibTeX  RDF decisional, doppelganger, static diffie-hellman, user interfaces, phishing, oblivious transfer, password authenticated key exchange
69Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, agent, Password, key exchange, inter-domain
69Markus Jakobsson, Steven Myers Delayed password disclosure. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF decisional & static diffie-hellman assumption, user interfaces, authentication, phishing, oblivious transfer, password authenticated key exchange
69Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Jean-Camille Birget Design and evaluation of a shoulder-surfing resistant graphical password scheme. Search on Bibsonomy AVI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF convex hull click scheme, authentication, usable security, graphical passwords, shoulder-surfing, password security
69Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan Password authenticated key exchange using hidden smooth subgroups. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, cryptography, password, key exchange
69Hea Suk Jo, Hee Yong Youn A Secure User Authentication Protocol Based on One-Time-Password for Home Network. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF three-way handshake, security, Authentication, home network, one-time password
69Michel Abdalla, David Pointcheval Simple Password-Based Encrypted Key Exchange Protocols. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted key exchange, Password, Diffie-Hellman assumptions
69Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague A Password-Based Authenticator: Security Proof and Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key agreement, password authentication, Key management protocols
66Dan Mossop, Ronald Pose Information Leakage and Capability Forgery in a Capability-Based Operating System Kernel. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Password-capabilities, access control, security analysis
66Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval A Simple Threshold Authenticated Key Exchange from Short Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Threshold Protocols, Password-based Authentication
64Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek Password Cracking Using Probabilistic Context-Free Grammars. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
64Seung Wook Jung, Souhwan Jung Secure Password Authentication for Distributed Computing. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Ran Canetti, Shai Halevi, Michael Steiner Mitigating Dictionary Attacks on Password-Protected Local Storage. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Frances F. Yao, Yiqun Lisa Yin Design and Analysis of Password-Based Key Derivation Functions. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
64Sundararaman Jeyaraman, Umut Topkara Have the cake and eat it too - Infusing usability into text-password based authentication systems. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
64Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor Two-Server Password-Only Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
64Frances F. Yao, Yiqun Lisa Yin Design and Analysis of Password-Based Key Derivation Functions. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
64Muxiang Zhang Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
64Art Conklin, Glenn B. Dietrich, Diane B. Walz Password-Based Authentication: A System Perspective. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
64Muxiang Zhang New Approaches to Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
64Mario Di Raimondo, Rosario Gennaro Provably Secure Threshold Password-Authenticated Key Exchange. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
64Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange
64Wei-Chi Ku A hash-based strong-password authentication scheme without using smart cards. Search on Bibsonomy Operating Systems Review The full citation details ... 2004 DBLP  DOI  BibTeX  RDF password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack
64Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
62Cheryl V. Hinds, Chinedu Ekwueme Increasing security and usability of computer systems with graphical passwords. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF usability, graphical passwords
62Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang A user authentication system using back-propagation network. Search on Bibsonomy Neural Computing and Applications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Neural network, Information security, User authentication, One-way hash function, Back-propagation network
62Julie Thorpe, Paul C. van Oorschot Towards Secure Design Choices for Implementing Graphical Passwords. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Jae-Woo Lee Client Authentication Model Using Duplicated Authentication Server Systems. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Jae-Woo Lee Security Agent Model Using Interactive Authentication Database. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot, Robert Biddle Multiple password interference in text passwords and click-based graphical passwords. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple password interference, authentication, usable security, graphical passwords
60Xun Yi, Raylin Tso, Eiji Okamoto ID-Based Group Password-Authenticated Key Exchange. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol compiler, common reference model, group key agreement, Password-authenticated key exchange
60Shuhua Wu, Yuefei Zhu Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, key exchange, password authenticated, dynamic group
60Karthik Nandakumar, Abhishek Nagar, Anil K. Jain 0001 Hardening Fingerprint Fuzzy Vault Using Password. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biometric template security, hardening, helper data, fingerprint, password, minutiae, fuzzy vault
60Eun-Jun Yoon, Kee-Young Yoo An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Grid computing, Password authentication
60Michel Abdalla, David Pointcheval Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password-based authentication, multi-party protocols, Diffie-Hellman assumptions
60Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication
60Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo Efficient and Secure Password Authentication Schemes for Low-Power Devices. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-power device, wireless network, password authentication, mutual authentication
60Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu A simple password authentication using a polynomial. Search on Bibsonomy Operating Systems Review The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, authentication, password
60Shuhong Wang 0001, Jie Wang, Maozhi Xu Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cross-realm setting, Security, Dictionary attacks, Password-authenticated key exchange
60Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi A Novel Approach to Proactive Password Checking. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Neural Network, Access Control, Data Security, Perceptron, Proactive Password Checking
60Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park Password-Authenticated Key Exchange between Clients with Different Passwords. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key exchange, Password authentication, dictionary attack, Kerberos, cross-realm
57Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, Ung-Mo Kim Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF undetectable on-line dictionary attack, Group key exchange, password-based authentication
55Xavier Boyen Hidden credential retrieval from a reusable password. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF online authentication, partially trusted servers, reusable passwords, stateless roaming credentials
55Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Hakan Gurbaslar, Burak Erdeniz Towards Usable Solutions to Graphical Password Hotspot Problem. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
55Shouhong Wang, Hai Wang 0008 Password Authentication Using Hopfield Neural Networks. Search on Bibsonomy IEEE Trans. Systems, Man, and Cybernetics, Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Victor K. Y. Wu, Roy H. Campbell Password Streaming for RFID Privacy. Search on Bibsonomy OTM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Yoginder S. Dandass Using FPGAs to Parallelize Dictionary Attacks for Password Cracking. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Dario Catalano, David Pointcheval, Thomas Pornin Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. Search on Bibsonomy J. Cryptology The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Attack, Timestamp, Nonce
55Gang Yao, Dengguo Feng, Xiaoxi Han Improved Client-to-Client Password-Authenticated Key Exchange Protocol. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Xiaoyuan Suo, Ying Zhu, G. Scott Owen Analysis and Design of Graphical Password Techniques. Search on Bibsonomy ISVC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55YeongGeun Choe, Soon-Ja Kim Secure Password Authentication for Keystroke Dynamics. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo Efficient Password-Based Authenticated Key Agreement Protocol. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
55David C. Feldmeier, Philip R. Karn UNIX Password Security - Ten Years Later. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
55Kazuki Yoneyama Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack
53Katherine Everitt, Tanya Bragin, James Fogarty, Tadayoshi Kohno A comprehensive study of frequency, interference, and training of multiple graphical passwords. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, usable security, graphical passwords
53Wen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line An novel two layer user identification method. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle Improving text passwords through persuasion. Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, passwords, persuasive technology, usable security
53Mohamed Chenafa, Dan Istrate, Valeriu Vrabie, Michel Herbin Biometric System Based on Voice Recognition Using Multiclassifiers. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Biometric recognition system, Isolated word recognition, GMM/UBM, Data fusion, Speaker identification
53Matthew Johnson Implementing a Multi-hat PDA. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2483 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license