Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,884,002 papers from all fields of science
Search
Sign In
Create Free Account
Passphrase
Known as:
Pass phrase
, Pass-phrase
A passphrase is a sequence of words or other text used to control access to a computer system, program or data. A passphrase is similar to a password…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access control
Acoustic cryptanalysis
Brute-force attack
Cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
HiLAM-state discriminative multi-task deep neural network in dynamic time warping framework for text-dependent speaker verification
Mohammad Azharuddin Laskar
,
R. Laskar
Speech Communication
2020
Corpus ID: 218943019
2017
2017
Infrastructure Mode Based Opportunistic Networks on Android Devices
Andre Ippisch
,
Kalman Graffi
International Conference on Advanced Information…
2017
Corpus ID: 7383776
Opportunistic Networks are delay-tolerant mobile networks with intermittent node contacts in which data is transferred with the…
Expand
2015
2015
Contributions to empirical analysis of keystroke dynamics in passwords
J. Filho
,
E. O. Freire
,
Murilo A. Bezerra
,
Rodolfo Garcia
Pattern Recognition Letters
2015
Corpus ID: 43284239
2013
2013
Voice based login authentication for Linux
Sarabjeet Singh
International Conference on Recent Trends in…
2013
Corpus ID: 11205146
This paper aims at implementing voice based login authentication on Linux systems. Presently face authentication, finger print…
Expand
2012
2012
Web-based Attacks on Host-Proof Encrypted Storage
K. Bhargavan
,
Antoine Delignat-Lavaud
Workshop on Offensive Technologies
2012
Corpus ID: 8428634
Cloud-based storage services, such as Wuala, and password managers, such as LastPass, are examples of so-called host-proof web…
Expand
2012
2012
Voice Passphrase Variability Evaluation for Speaker Recognition
Vladislav Sukhmel
,
Sergei Aleinik
,
Vadim Shchemelinin
International Workshop on Computational Forensics
2012
Corpus ID: 30118799
We propose a method of voice passphrase variability calculation. To calculate the variability, we transform an acoustic…
Expand
2007
2007
Covert computer and network communications
R. Newman
Annual Conference on Information Security…
2007
Corpus ID: 23411397
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for…
Expand
Review
2006
Review
2006
End User Security
Ben Tribelhorn
,
Harvey Mudd
2006
Corpus ID: 39771136
This paper details security risks, compromises, and options available to the average computer user. It includes specific…
Expand
2003
2003
GBDE-GEOM Based Disk Encryption
Poul-Henning Kamp
USENIX Conference on the BSD operating system
2003
Corpus ID: 17472515
The ever increasing mobility of computers has made protection of data on digital storage media an important requirement in a…
Expand
2001
2001
Echo Back in Implementation of Passphrase Authentication
Kanta Matsuura
2001
Corpus ID: 189923457
In spite of well known vulnerabilities password based authentication is still widely used One possible improvement is to use long…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE