Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Contraseña")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 298

  • Page / 12
Export

Selection :

  • and

Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article

Impact of restrictive composition policy on user password choicesCAMPBELL, John; WANLI MA; KLEEMAN, Dale et al.Behaviour & information technology (Print). 2011, Vol 30, Num 3, pp 379-388, issn 0144-929X, 10 p.Article

An improvement of the Yang-Shieh password authentication schemesYANG, Chou-Chen; WANG, Ren-Chiun; CHANG, Ting-Yi et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1391-1396, issn 0096-3003, 6 p.Article

Rethinking PasswordsCHESWICK, William.Communications of the ACM. 2013, Vol 56, Num 2, pp 40-44, issn 0001-0782, 5 p.Article

Improvement of HWWM-authenticated key agreement protocolLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1315-1320, issn 0096-3003, 6 p.Article

The psychology of password management: a tradeoff between security and convenienceTAM, L; GLASSMAN, M; VANDENWAUVER, M et al.Behaviour & information technology (Print). 2010, Vol 29, Num 3, pp 233-244, issn 0144-929X, 12 p.Article

User Authentication Scheme with Privacy-Preservation for Multi-Server EnvironmentWANG, Ren-Chiun; JUANG, Wen-Shenq; LEI, Chin-Laung et al.IEEE communications letters. 2009, Vol 13, Num 2, pp 157-159, issn 1089-7798, 3 p.Article

Advances in password crackingMARECHAL, Simon.Journal in computer virology. 2008, Vol 4, Num 1, pp 73-81, issn 1772-9890, 9 p.Conference Paper

Cryptanalysis of Lee-Kim-Yoo password-based key agreement schemeJEOUNG OK KWON; JUNG YEON HWANG; KIM, Changwook et al.Applied mathematics and computation. 2005, Vol 168, Num 2, pp 858-865, issn 0096-3003, 8 p.Article

An improvement on Yang et al.'s password authentication schemesKIM, Kee-Won; JEON, Jun-Cheol; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 207-215, issn 0096-3003, 9 p.Article

Open Sesame: Design Guidelines for Invisible Passwords : Interaction Beyond the KeyboardBIANCHI, Andrea; OAKLEY, Ian; KWON, Dong-Soo et al.Computer (Long Beach, CA). 2012, Vol 45, Num 4, pp 58-65, issn 0018-9162, 8 p.Article

identifiant et mot de passe quelles garanties juridiques?BAZIN, Philippe.Archimag (Vincennes). 2009, Num 226, pp 36-37, issn 0769-0975, 2 p.Article

Internet Communications SecuritySIERRA, Jose Maria.Computer communications. 2006, Vol 29, Num 15, issn 0140-3664, 273 p.Serial Issue

Are Password Requirements too Difficult?SCHAFFER, Kim.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 90-92, issn 0018-9162, 3 p.Article

A Novel approach to Transformed Biometrics using successive projectionsGOPI, E. S.Proceedings of SPIE, the International Society for Optical Engineering. 2010, Vol 7546, issn 0277-786X, isbn 978-0-8194-7942-6 0-8194-7942-X, 75461Z.1.-75461Z.6, 2Conference Paper

Comments on modified user friendly remote authentication scheme with smart cardsYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on communications. 2007, Vol 90, Num 2, pp 331-333, issn 0916-8516, 3 p.Article

Social phishingJAGATIC, Tom N; JOHNSON, Nathaniel A; JAKOBSSON, Markus et al.Communications of the ACM. 2007, Vol 50, Num 10, pp 94-100, issn 0001-0782, 7 p.Article

Selecting secure passwordsVERHEUL, Eric R.Lecture notes in computer science. 2006, pp 49-66, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 18 p.Conference Paper

Efficient nonce-based remote user authentication scheme using smart cardsLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 167, Num 1, pp 355-361, issn 0096-3003, 7 p.Article

Design and Implementation of GUISET-Driven Authentication FrameworkEKABUA; OBETEN, O; ADIGUN et al.Grid computing & applications. International conferenceWorldComp'2011. 2011, pp 14-20, isbn 1-60132-181-3, 7 p.Conference Paper

Easing Text-based Mobile Device User Authentication MechanismsHUTCHINGS, Dugald Ralph.Security & management. International conferenceWorldComp'2011. 2011, pp 143-149, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

The Knowledge Based Authentication AttacksTOWHIDI, Farnaz; ABDUL MANAF, Azizah; MOHD DAUD, Salwani et al.Security & management. International conferenceWorldComp'2011. 2011, pp 649-653, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

Password Hardening Using Keystroke DynamicsANSAB IJAZ, A; ARSLAN JAVED, B; SAAD AMAN CHAUDHRY, C et al.Security & management. International conferenceWorldComp'2010. 2010, pp 229-233, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 5 p.Conference Paper

An Off-Line Dictionary Attack on a Simple Three-Party Key Exchange ProtocolNAM, Junghyun; PAIK, Juryon; KANG, Hyun-Kyu et al.IEEE communications letters. 2009, Vol 13, Num 3, pp 205-207, issn 1089-7798, 3 p.Article

Threshold password-authenticated key exchangeMACKENZIE, Philip; SHRIMPTON, Thomas; JAKOBSSON, Markus et al.Journal of cryptology. 2006, Vol 19, Num 1, pp 27-66, issn 0933-2790, 40 p.Article

  • Page / 12