Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("passwords")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 346

  • Page / 14
Export

Selection :

  • and

GeoGraphical passwordsAL-SALLOUM, Ziyad S.International journal of security and networks (Print). 2014, Vol 9, Num 1, pp 56-62, issn 1747-8405, 7 p.Article

PassPoints : Design and longitudinal evaluation of a graphical password systemWIEDENBECK, Susan; WATERS, Jim; BIRGET, Jean-Camille et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 102-127, issn 1071-5819, 26 p.Article

Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwordsNELSON, Deborah; VU, Kim-Phuong L.Computers in human behavior. 2010, Vol 26, Num 4, pp 705-715, issn 0747-5632, 11 p.Article

User Authentication Scheme with Privacy-Preservation for Multi-Server EnvironmentWANG, Ren-Chiun; JUANG, Wen-Shenq; LEI, Chin-Laung et al.IEEE communications letters. 2009, Vol 13, Num 2, pp 157-159, issn 1089-7798, 3 p.Article

Cryptanalysis of Lee-Kim-Yoo password-based key agreement schemeJEOUNG OK KWON; JUNG YEON HWANG; KIM, Changwook et al.Applied mathematics and computation. 2005, Vol 168, Num 2, pp 858-865, issn 0096-3003, 8 p.Article

An improvement on Yang et al.'s password authentication schemesKIM, Kee-Won; JEON, Jun-Cheol; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 207-215, issn 0096-3003, 9 p.Article

Comments on modified user friendly remote authentication scheme with smart cardsYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on communications. 2007, Vol 90, Num 2, pp 331-333, issn 0916-8516, 3 p.Article

Efficient nonce-based remote user authentication scheme using smart cardsLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 167, Num 1, pp 355-361, issn 0096-3003, 7 p.Article

A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key CryptographyKIM, Minho; KOC, Cetin Kaya.Journal of information science and engineering. 2008, Vol 24, Num 4, pp 1213-1227, issn 1016-2364, 15 p.Article

Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article

A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing AttacksTSAI, Jia-Lun; LO, Nai-Wei; WU, Tzong-Chen et al.Wireless personal communications. 2013, Vol 71, Num 3, pp 1977-1988, issn 0929-6212, 12 p.Article

Improving information security management: An analysis of ID―password usage and a new login vulnerability measureYOUNGSOK BANG; LEE, Dong-Joo; BAE, Yoon-Soo et al.International journal of information management. 2012, Vol 32, Num 5, pp 409-418, issn 0268-4012, 10 p.Article

A security enhanced password authentication and update scheme based on elliptic curve cryptographyPENGSHUAI QIAO; HANG TU.International journal of electronic security and digital forensics (Print). 2014, Vol 6, Num 2, pp 130-139, issn 1751-911X, 10 p.Article

Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication ProtocolJEONG, Hanjae; DONGHO WON; SEUNGJOO KIM et al.Journal of information science and engineering. 2010, Vol 26, Num 5, pp 1845-1858, issn 1016-2364, 14 p.Article

Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart CardsKIM, Jung-Yoon; CHOI, Hyoung-Kee.IEICE transactions on information and systems. 2012, Vol 95, Num 10, pp 2393-2400, issn 0916-8532, 8 p.Article

Authentication schemes with no verification tableCHANG, Ya-Fen; CHANG, Chin-Chen.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 820-832, issn 0096-3003, 13 p.Article

An Off-Line Dictionary Attack on a Simple Three-Party Key Exchange ProtocolNAM, Junghyun; PAIK, Juryon; KANG, Hyun-Kyu et al.IEEE communications letters. 2009, Vol 13, Num 3, pp 205-207, issn 1089-7798, 3 p.Article

Threshold password-authenticated key exchangeMACKENZIE, Philip; SHRIMPTON, Thomas; JAKOBSSON, Markus et al.Journal of cryptology. 2006, Vol 19, Num 1, pp 27-66, issn 0933-2790, 40 p.Article

Comments on YEH-SHEN-HWANG's one-time password authentication schemeYOU, Il-Sun; CHO, Kyungsan.IEICE transactions on communications. 2005, Vol 88, Num 2, pp 751-753, issn 0916-8516, 3 p.Article

Security enhancement for optimal strong-password authentication protocolLIN, Chih-Wei; SHEN, Jau-Ji; HWANG, Min-Shiang et al.Operating systems review. 2003, Vol 37, Num 2, pp 7-12, issn 0163-5980, 6 p.Article

Password authentication using Newton's interpolating polynomialsLIN, C. H; CHANG, C. C; WU, T. C et al.Information systems (Oxford). 1991, Vol 16, Num 1, pp 97-102, issn 0306-4379, 6 p.Article

A more efficient and secure dynamic ID-based remote user authentication schemeWANG, Yan-Yan; LIU, Jia-Yong; XIAO, Feng-Xia et al.Computer communications. 2009, Vol 32, Num 4, pp 583-585, issn 0140-3664, 3 p.Article

Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architectureKU, Wei-Chi.IEEE transactions on neural networks. 2005, Vol 16, Num 4, pp 1002-1005, issn 1045-9227, 4 p.Article

Weaknesses of a remote user authentication scheme using smart cards for multi-server architectureKU, Wei-Chi; CHANG, Shen-Tien; CHIANG, Min-Hung et al.IEICE transactions on communications. 2005, Vol 88, Num 8, pp 3451-3454, issn 0916-8516, 4 p.Article

Fixing problems in lin et al.'s OSPA protocolYOON, Eun-Jun; RYU, Eun-Kyung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 166, Num 1, pp 46-57, issn 0096-3003, 12 p.Article

  • Page / 14