Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,308 papers from all fields of science
Search
Sign In
Create Free Account
Password (video gaming)
Known as:
Password (disambiguation)
, Password (video games)
, Password save
In many video games of the 8-bit and, to a lesser extent, 16-bit eras (third and fourth generations), after a level was beaten and/or when all…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
.hack
Algorithm
Around the World in 80 Days
Ganso Saiyūki: Super Monkey Daibōken
Expand
Broader (1)
Video game design
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Input Password Using Simple Input Device
M. Okamoto
Future Technologies Conference
2018
Corpus ID: 69263477
Password-based authentication is a basic technique that is used for user authentication in information technology. However…
Expand
2018
2018
Graphical Password with Convex
Hull
2018
Corpus ID: 56246591
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can…
Expand
2017
2017
Augmented Cognition for Continuous Authentication
Nancy Mogire
,
Michael-Brian C. Ogawa
,
B. Auernheimer
,
M. Crosby
Interacción
2017
Corpus ID: 13101443
Authentication serves the gatekeeping function in computing systems. Methods used in authentication fall into three major…
Expand
2016
2016
https password save bookmarklet | Ejectamenta
Dave Watts
2016
Corpus ID: 59772079
2010
2010
Password Protected? Can a Password Save Your Cell Phone from the Search Incident to Arrest Doctrine?
Adam M. Gershowitz
2010
Corpus ID: 108480624
Over the last few years, dozens of courts have authorized police to conduct warrantless searches of cell phones when arresting…
Expand
2007
2007
Framework for Windows Password Function Security Enhancement
Li Li
,
Jing Wu
,
Xiaowei Guo
,
Meng Li
,
X. Niu
Intelligent Information Hiding and Multimedia…
2007
Corpus ID: 17678756
The wide application of Windows operation system people is bringing higher request for the security of the system. Identification…
Expand
2005
2005
The N/R one time password system
Vipul Goyal
,
A. Abraham
,
S. Sanyal
,
Sang-Yong Han
International Conference on Information…
2005
Corpus ID: 18613280
A new one time password system is described which is secure against eavesdropping and server database compromise at the same time…
Expand
2003
2003
Secure Password System against Imposter
Sung-Bae Park
,
S. Park
,
Moon-seol Kang
2003
Corpus ID: 59791653
We present a new password system, called dual password system, with the user verification procedure. Dual password system is the…
Expand
2003
2003
Building a management information system
N. Burford
2003
Corpus ID: 56603331
Statistics are an important tool in management decision-making. Every area of the library performs work that is measurable in…
Expand
1976
1976
ACM Forum: ACM name change
C. Yuen
CACM
1976
Corpus ID: 18966606
In his October Vice-President's letter, McCracken says "The name ought to be Association for Computing Machinists... we are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE