Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Mot de passe")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 333

  • Page / 14
Export

Selection :

  • and

PassPoints : Design and longitudinal evaluation of a graphical password systemWIEDENBECK, Susan; WATERS, Jim; BIRGET, Jean-Camille et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 102-127, issn 1071-5819, 26 p.Article

A secure and efficient strong-password authentication protocolCHANG, Ya-Fen; CHANG, Chin-Chen.Operating systems review. 2004, Vol 38, Num 3, pp 79-90, issn 0163-5980, 12 p.Article

Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article

Choosing passwords: Security and human factorsGEHRINGER, Edward F.ISTAS'02 : international symposium on technology and society. 2002, pp 369-373, isbn 0-7803-7284-0, 5 p.Conference Paper

Password authentication without using a password tableHORNG, G.Information processing letters. 1995, Vol 55, Num 5, pp 247-250, issn 0020-0190Article

Impact of restrictive composition policy on user password choicesCAMPBELL, John; WANLI MA; KLEEMAN, Dale et al.Behaviour & information technology (Print). 2011, Vol 30, Num 3, pp 379-388, issn 0144-929X, 10 p.Article

Fortifying key negotiation schemes with poorly chosen passwordsANDERSON, R. J; LOMAS, T. M. A.Electronics Letters. 1994, Vol 30, Num 13, pp 1040-1041, issn 0013-5194Article

An improvement of security enhancement for the timestamp-based password authentication scheme using smart cardsYANG, Chou-Chen; WANG, Ren-Chiun.Operating systems review. 2004, Vol 38, Num 3, pp 91-96, issn 0163-5980, 6 p.Article

Password security is a must for any organizationBERGER, Marshall A.Computers in libraries. 2003, Vol 23, Num 5, issn 1041-7915, p. 41Article

Collisionful keyed hash functions with selectable collisionsLI GONG.Information processing letters. 1995, Vol 55, Num 3, pp 167-170, issn 0020-0190Article

An improvement of the Yang-Shieh password authentication schemesYANG, Chou-Chen; WANG, Ren-Chiun; CHANG, Ting-Yi et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1391-1396, issn 0096-3003, 6 p.Article

Generating and remembering passwordsBROWN, Alan S; BRACKEN, Elisabeth; ZOCCOLI, Sandy et al.Applied cognitive psychology. 2004, Vol 18, Num 6, pp 641-651, issn 0888-4080, 11 p.Article

Rethinking PasswordsCHESWICK, William.Communications of the ACM. 2013, Vol 56, Num 2, pp 40-44, issn 0001-0782, 5 p.Article

Using smart cards to authenticate remote passwordsCHANG, C.-C; HWANG, S.-J.Computers & mathematics with applications (1987). 1993, Vol 26, Num 7, pp 19-27, issn 0898-1221Article

Systèmes informatiques et risquesELOY, M.Le droit de la preuve face aux nouvelles technologies de l'information. Cahiers du CRID. 1991, Num 7, pp 3-37Book Chapter

Open Sesame: Design Guidelines for Invisible Passwords : Interaction Beyond the KeyboardBIANCHI, Andrea; OAKLEY, Ian; KWON, Dong-Soo et al.Computer (Long Beach, CA). 2012, Vol 45, Num 4, pp 58-65, issn 0018-9162, 8 p.Article

identifiant et mot de passe quelles garanties juridiques?BAZIN, Philippe.Archimag (Vincennes). 2009, Num 226, pp 36-37, issn 0769-0975, 2 p.Article

Internet Communications SecuritySIERRA, Jose Maria.Computer communications. 2006, Vol 29, Num 15, issn 0140-3664, 273 p.Serial Issue

Are Password Requirements too Difficult?SCHAFFER, Kim.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 90-92, issn 0018-9162, 3 p.Article

A Novel approach to Transformed Biometrics using successive projectionsGOPI, E. S.Proceedings of SPIE, the International Society for Optical Engineering. 2010, Vol 7546, issn 0277-786X, isbn 978-0-8194-7942-6 0-8194-7942-X, 75461Z.1.-75461Z.6, 2Conference Paper

Comments on modified user friendly remote authentication scheme with smart cardsYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on communications. 2007, Vol 90, Num 2, pp 331-333, issn 0916-8516, 3 p.Article

Social phishingJAGATIC, Tom N; JOHNSON, Nathaniel A; JAKOBSSON, Markus et al.Communications of the ACM. 2007, Vol 50, Num 10, pp 94-100, issn 0001-0782, 7 p.Article

Selecting secure passwordsVERHEUL, Eric R.Lecture notes in computer science. 2006, pp 49-66, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 18 p.Conference Paper

Efficient nonce-based remote user authentication scheme using smart cardsLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 167, Num 1, pp 355-361, issn 0096-3003, 7 p.Article

Kay management for decentralized computer network servicesHARN, L; HUNG-YU LIN.IEEE transactions on communications. 1993, Vol 41, Num 12, pp 1777-1779, issn 0090-6778Article

  • Page / 14