Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,355,764 papers from all fields of science
Search
Sign In
Create Free Account
Password Authentication Protocol
Known as:
PAP
, PAP (computer)
A password authentication protocol (PAP) is an authentication protocol that uses a password. PAP is used by Point to Point Protocol to validate users…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Authentication protocol
Challenge-Handshake Authentication Protocol
Extensible Authentication Protocol
Network operating system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Predicting student academic performance in an engineering dynamics course: A comparison of four types of predictive mathematical models
Shaobo Huang
,
N. Fang
Comput. Educ.
2013
Corpus ID: 1246958
Highly Cited
2012
Highly Cited
2012
The Ideology of Pragmatism: Neo-liberal Globalisation and Political Authoritarianism in Singapore
K. Tan
2012
Corpus ID: 56236985
Abstract This article uncovers the strongly ideological quality in Singapore's theory and practice of pragmatism. It also points…
Expand
2011
2011
Inverse Cookie-based Virtual Password Authentication Protocol
S. Sood
,
A. Sarje
,
Kuldip Singh
International Journal of Network Security
2011
Corpus ID: 17797709
Password is the most commonly used authentication technique to authenticate the users on the web. Password based authentication…
Expand
Highly Cited
2010
Highly Cited
2010
Advanced smart card based password authentication protocol
Ronggong Song
Comput. Stand. Interfaces
2010
Corpus ID: 32967768
Highly Cited
2009
Highly Cited
2009
Increased mortality associated with Cheyne-Stokes respiration in patients with congestive heart failure
Lanfranchi Pa
,
B. A
,
+4 authors
G. P.
2009
Corpus ID: 14009016
1 Sin et al. American Journal of Respiratory Critical Care Medicine; 1999 2 Lafranchi et al. Circulation; 1999 3 Philippe et al…
Expand
2006
2006
A Hash-based Strong Password Authentication Protocol with User Anonymity
Kumar V. Mangipudi
,
R. Katti
International Journal of Network Security
2006
Corpus ID: 10731590
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication…
Expand
Highly Cited
2004
Highly Cited
2004
Cervical Cancer Detection Using SVM Based Feature Screening
Jiayong Zhang
,
Yanxi Liu
International Conference on Medical Image…
2004
Corpus ID: 258700
We present a novel feature screening algorithm by deriving relevance measures from the decision boundary of Support Vector Ma…
Expand
Highly Cited
2003
Highly Cited
2003
A password authentication scheme with secure password updating
Chun-Li Lin
,
T. Hwang
Computers & security
2003
Corpus ID: 40534101
Review
1999
Review
1999
Temporal variability in living deep-sea benthic foraminifera: a review
A. Gooday
,
A. Rathburn
1999
Corpus ID: 53546904
Highly Cited
1991
Highly Cited
1991
Computer simulation of structural transformations during precipitation of an ordered intermetallic phase
Long-Qing Chen
,
A. Khachaturyan
1991
Corpus ID: 98547837
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required