Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Password")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 499

  • Page / 20
Export

Selection :

  • and

Off-line password-guessing attacks on the generalized key agreement and password authentication protocolSHIM, Kyungah.Applied mathematics and computation. 2005, Vol 169, Num 1, pp 511-515, issn 0096-3003, 5 p.Article

PassPoints : Design and longitudinal evaluation of a graphical password systemWIEDENBECK, Susan; WATERS, Jim; BIRGET, Jean-Camille et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 102-127, issn 1071-5819, 26 p.Article

Round-Optimal Password-Based Authenticated Key ExchangeKATZ, Jonathan; VAIKUNTANATHAN, Vinod.Journal of cryptology. 2013, Vol 26, Num 4, pp 714-743, issn 0933-2790, 30 p.Article

Using one-time passwords to prevent password phishing attacksHUANG, Chun-Ying; MA, Shang-Pin; CHEN, Kuan-Ta et al.Journal of network and computer applications. 2011, Vol 34, Num 4, pp 1292-1301, issn 1084-8045, 10 p.Article

Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwordsNELSON, Deborah; VU, Kim-Phuong L.Computers in human behavior. 2010, Vol 26, Num 4, pp 705-715, issn 0747-5632, 11 p.Article

«Password-Plus», authentification using dynamic featuresDE BRUYNE, P; DIEHL, R; LOSA, E et al.Scientia Electrica. 1990, Vol 36, Num 2, pp 1-19, issn 0036-8695, 19 p.Article

Impersonation attack on two-gene-relation password authentication protocol (2GR)LIN, Chun-Li; HUNG, Ching-Po.IEICE transactions on communications. 2006, Vol 89, Num 12, pp 3425-3427, issn 0916-8516, 3 p.Article

Cryptanalysis of Lee-Kim-Yoo password-based key agreement schemeJEOUNG OK KWON; JUNG YEON HWANG; KIM, Changwook et al.Applied mathematics and computation. 2005, Vol 168, Num 2, pp 858-865, issn 0096-3003, 8 p.Article

An improvement on Yang et al.'s password authentication schemesKIM, Kee-Won; JEON, Jun-Cheol; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 207-215, issn 0096-3003, 9 p.Article

User Authentication Scheme with Privacy-Preservation for Multi-Server EnvironmentWANG, Ren-Chiun; JUANG, Wen-Shenq; LEI, Chin-Laung et al.IEEE communications letters. 2009, Vol 13, Num 2, pp 157-159, issn 1089-7798, 3 p.Article

Efficient nonce-based remote user authentication scheme using smart cardsLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 167, Num 1, pp 355-361, issn 0096-3003, 7 p.Article

Comments on modified user friendly remote authentication scheme with smart cardsYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on communications. 2007, Vol 90, Num 2, pp 331-333, issn 0916-8516, 3 p.Article

A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key CryptographyKIM, Minho; KOC, Cetin Kaya.Journal of information science and engineering. 2008, Vol 24, Num 4, pp 1213-1227, issn 1016-2364, 15 p.Article

gérer ses mots de passe sur internetCAMARA, Sharon.Archimag (Vincennes). 2014, Num 275, issn 0769-0975, p. 40Article

GeoGraphical passwordsAL-SALLOUM, Ziyad S.International journal of security and networks (Print). 2014, Vol 9, Num 1, pp 56-62, issn 1747-8405, 7 p.Article

Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article

Multiple password interference in graphical passwordsHAICHANG GAO; LICHENG MA; WEI JIA et al.International journal of information and computer security (Print). 2012, Vol 5, Num 1, pp 11-27, issn 1744-1765, 17 p.Article

A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing AttacksTSAI, Jia-Lun; LO, Nai-Wei; WU, Tzong-Chen et al.Wireless personal communications. 2013, Vol 71, Num 3, pp 1977-1988, issn 0929-6212, 12 p.Article

Improving information security management: An analysis of ID―password usage and a new login vulnerability measureYOUNGSOK BANG; LEE, Dong-Joo; BAE, Yoon-Soo et al.International journal of information management. 2012, Vol 32, Num 5, pp 409-418, issn 0268-4012, 10 p.Article

Security analysis of a password-based authentication protocol proposed to IEEE 1363ZHU ZHAO; ZHONGQI DONG; YONGGE WANG et al.Theoretical computer science. 2006, Vol 352, Num 1-3, pp 280-287, issn 0304-3975, 8 p.Article

Efficient verifier-based key agreement protocol for three parties without server's public keyLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 996-1003, issn 0096-3003, 8 p.Article

A security enhanced password authentication and update scheme based on elliptic curve cryptographyPENGSHUAI QIAO; HANG TU.International journal of electronic security and digital forensics (Print). 2014, Vol 6, Num 2, pp 130-139, issn 1751-911X, 10 p.Article

Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication ProtocolJEONG, Hanjae; DONGHO WON; SEUNGJOO KIM et al.Journal of information science and engineering. 2010, Vol 26, Num 5, pp 1845-1858, issn 1016-2364, 14 p.Article

Improvement of one-time password authentication scheme using smart cardsLEE, Narn-Yih; CHEN, Jung-Chic.IEICE transactions on communications. 2005, Vol 88, Num 9, pp 3765-3767, issn 0916-8516, 3 p.Article

Secure Computation Without AuthenticationBARAK, Boaz; CANETTI, Ran; LINDELL, Yehuda et al.Journal of cryptology. 2011, Vol 24, Num 4, pp 720-760, issn 0933-2790, 41 p.Article

  • Page / 20