Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Mot de passe")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 479

  • Page / 20
Export

Selection :

  • and

PassPoints : Design and longitudinal evaluation of a graphical password systemWIEDENBECK, Susan; WATERS, Jim; BIRGET, Jean-Camille et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 102-127, issn 1071-5819, 26 p.Article

A secure and efficient strong-password authentication protocolCHANG, Ya-Fen; CHANG, Chin-Chen.Operating systems review. 2004, Vol 38, Num 3, pp 79-90, issn 0163-5980, 12 p.Article

Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article

gérer ses mots de passe sur internetCAMARA, Sharon.Archimag (Vincennes). 2014, Num 275, issn 0769-0975, p. 40Article

Choosing passwords: Security and human factorsGEHRINGER, Edward F.ISTAS'02 : international symposium on technology and society. 2002, pp 369-373, isbn 0-7803-7284-0, 5 p.Conference Paper

Password authentication without using a password tableHORNG, G.Information processing letters. 1995, Vol 55, Num 5, pp 247-250, issn 0020-0190Article

Impact of restrictive composition policy on user password choicesCAMPBELL, John; WANLI MA; KLEEMAN, Dale et al.Behaviour & information technology (Print). 2011, Vol 30, Num 3, pp 379-388, issn 0144-929X, 10 p.Article

Fortifying key negotiation schemes with poorly chosen passwordsANDERSON, R. J; LOMAS, T. M. A.Electronics Letters. 1994, Vol 30, Num 13, pp 1040-1041, issn 0013-5194Article

An improvement of security enhancement for the timestamp-based password authentication scheme using smart cardsYANG, Chou-Chen; WANG, Ren-Chiun.Operating systems review. 2004, Vol 38, Num 3, pp 91-96, issn 0163-5980, 6 p.Article

ID-based password authentication scheme using smart cards and fingerprintsKIM, Hyun-Sung; LEE, Sung-Woon; YOO, Kee-Young et al.Operating systems review. 2003, Vol 37, Num 4, pp 32-41, issn 0163-5980, 10 p.Article

Password security is a must for any organizationBERGER, Marshall A.Computers in libraries. 2003, Vol 23, Num 5, issn 1041-7915, p. 41Article

Collisionful keyed hash functions with selectable collisionsLI GONG.Information processing letters. 1995, Vol 55, Num 3, pp 167-170, issn 0020-0190Article

Protecting poorly chosen secrets from guessing attacksLI GONG; LOMAS, M. A; NEEDHAM, R. M et al.IEEE journal on selected areas in communications. 1993, Vol 11, Num 5, pp 648-656, issn 0733-8716Article

An improvement of the Yang-Shieh password authentication schemesYANG, Chou-Chen; WANG, Ren-Chiun; CHANG, Ting-Yi et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1391-1396, issn 0096-3003, 6 p.Article

Generating and remembering passwordsBROWN, Alan S; BRACKEN, Elisabeth; ZOCCOLI, Sandy et al.Applied cognitive psychology. 2004, Vol 18, Num 6, pp 641-651, issn 0888-4080, 11 p.Article

Rethinking PasswordsCHESWICK, William.Communications of the ACM. 2013, Vol 56, Num 2, pp 40-44, issn 0001-0782, 5 p.Article

Using smart cards to authenticate remote passwordsCHANG, C.-C; HWANG, S.-J.Computers & mathematics with applications (1987). 1993, Vol 26, Num 7, pp 19-27, issn 0898-1221Article

Round-Optimal Password-Based Authenticated Key ExchangeKATZ, Jonathan; VAIKUNTANATHAN, Vinod.Journal of cryptology. 2013, Vol 26, Num 4, pp 714-743, issn 0933-2790, 30 p.Article

Systèmes informatiques et risquesELOY, M.Le droit de la preuve face aux nouvelles technologies de l'information. Cahiers du CRID. 1991, Num 7, pp 3-37Book Chapter

Password-only authenticated key establishment protocol without public key cryptographyLAIH, C. S; DING, L; HUANG, Y. M et al.Electronics Letters. 2005, Vol 41, Num 4, pp 185-186, issn 0013-5194, 2 p.Article

Security enhancement for optimal strong-password authentication protocolLIN, Chih-Wei; SHEN, Jau-Ji; HWANG, Min-Shiang et al.Operating systems review. 2003, Vol 37, Num 3, pp 12-16, issn 0163-5980, 5 p.Article

Open Sesame: Design Guidelines for Invisible Passwords : Interaction Beyond the KeyboardBIANCHI, Andrea; OAKLEY, Ian; KWON, Dong-Soo et al.Computer (Long Beach, CA). 2012, Vol 45, Num 4, pp 58-65, issn 0018-9162, 8 p.Article

identifiant et mot de passe quelles garanties juridiques?BAZIN, Philippe.Archimag (Vincennes). 2009, Num 226, pp 36-37, issn 0769-0975, 2 p.Article

Internet Communications SecuritySIERRA, Jose Maria.Computer communications. 2006, Vol 29, Num 15, issn 0140-3664, 273 p.Serial Issue

Are Password Requirements too Difficult?SCHAFFER, Kim.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 90-92, issn 0018-9162, 3 p.Article

  • Page / 20