kw.\*:("Mot de passe")
Results 1 to 25 of 479
Selection :
PassPoints : Design and longitudinal evaluation of a graphical password systemWIEDENBECK, Susan; WATERS, Jim; BIRGET, Jean-Camille et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 102-127, issn 1071-5819, 26 p.Article
A secure and efficient strong-password authentication protocolCHANG, Ya-Fen; CHANG, Chin-Chen.Operating systems review. 2004, Vol 38, Num 3, pp 79-90, issn 0163-5980, 12 p.Article
Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article
gérer ses mots de passe sur internetCAMARA, Sharon.Archimag (Vincennes). 2014, Num 275, issn 0769-0975, p. 40Article
Choosing passwords: Security and human factorsGEHRINGER, Edward F.ISTAS'02 : international symposium on technology and society. 2002, pp 369-373, isbn 0-7803-7284-0, 5 p.Conference Paper
Password authentication without using a password tableHORNG, G.Information processing letters. 1995, Vol 55, Num 5, pp 247-250, issn 0020-0190Article
Impact of restrictive composition policy on user password choicesCAMPBELL, John; WANLI MA; KLEEMAN, Dale et al.Behaviour & information technology (Print). 2011, Vol 30, Num 3, pp 379-388, issn 0144-929X, 10 p.Article
Fortifying key negotiation schemes with poorly chosen passwordsANDERSON, R. J; LOMAS, T. M. A.Electronics Letters. 1994, Vol 30, Num 13, pp 1040-1041, issn 0013-5194Article
An improvement of security enhancement for the timestamp-based password authentication scheme using smart cardsYANG, Chou-Chen; WANG, Ren-Chiun.Operating systems review. 2004, Vol 38, Num 3, pp 91-96, issn 0163-5980, 6 p.Article
ID-based password authentication scheme using smart cards and fingerprintsKIM, Hyun-Sung; LEE, Sung-Woon; YOO, Kee-Young et al.Operating systems review. 2003, Vol 37, Num 4, pp 32-41, issn 0163-5980, 10 p.Article
Password security is a must for any organizationBERGER, Marshall A.Computers in libraries. 2003, Vol 23, Num 5, issn 1041-7915, p. 41Article
Collisionful keyed hash functions with selectable collisionsLI GONG.Information processing letters. 1995, Vol 55, Num 3, pp 167-170, issn 0020-0190Article
Protecting poorly chosen secrets from guessing attacksLI GONG; LOMAS, M. A; NEEDHAM, R. M et al.IEEE journal on selected areas in communications. 1993, Vol 11, Num 5, pp 648-656, issn 0733-8716Article
An improvement of the Yang-Shieh password authentication schemesYANG, Chou-Chen; WANG, Ren-Chiun; CHANG, Ting-Yi et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1391-1396, issn 0096-3003, 6 p.Article
Generating and remembering passwordsBROWN, Alan S; BRACKEN, Elisabeth; ZOCCOLI, Sandy et al.Applied cognitive psychology. 2004, Vol 18, Num 6, pp 641-651, issn 0888-4080, 11 p.Article
Rethinking PasswordsCHESWICK, William.Communications of the ACM. 2013, Vol 56, Num 2, pp 40-44, issn 0001-0782, 5 p.Article
Using smart cards to authenticate remote passwordsCHANG, C.-C; HWANG, S.-J.Computers & mathematics with applications (1987). 1993, Vol 26, Num 7, pp 19-27, issn 0898-1221Article
Round-Optimal Password-Based Authenticated Key ExchangeKATZ, Jonathan; VAIKUNTANATHAN, Vinod.Journal of cryptology. 2013, Vol 26, Num 4, pp 714-743, issn 0933-2790, 30 p.Article
Systèmes informatiques et risquesELOY, M.Le droit de la preuve face aux nouvelles technologies de l'information. Cahiers du CRID. 1991, Num 7, pp 3-37Book Chapter
Password-only authenticated key establishment protocol without public key cryptographyLAIH, C. S; DING, L; HUANG, Y. M et al.Electronics Letters. 2005, Vol 41, Num 4, pp 185-186, issn 0013-5194, 2 p.Article
Security enhancement for optimal strong-password authentication protocolLIN, Chih-Wei; SHEN, Jau-Ji; HWANG, Min-Shiang et al.Operating systems review. 2003, Vol 37, Num 3, pp 12-16, issn 0163-5980, 5 p.Article
Open Sesame: Design Guidelines for Invisible Passwords : Interaction Beyond the KeyboardBIANCHI, Andrea; OAKLEY, Ian; KWON, Dong-Soo et al.Computer (Long Beach, CA). 2012, Vol 45, Num 4, pp 58-65, issn 0018-9162, 8 p.Article
identifiant et mot de passe quelles garanties juridiques?BAZIN, Philippe.Archimag (Vincennes). 2009, Num 226, pp 36-37, issn 0769-0975, 2 p.Article
Internet Communications SecuritySIERRA, Jose Maria.Computer communications. 2006, Vol 29, Num 15, issn 0140-3664, 273 p.Serial Issue
Are Password Requirements too Difficult?SCHAFFER, Kim.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 90-92, issn 0018-9162, 3 p.Article