Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,275,185 papers from all fields of science
Search
Sign In
Create Free Account
Password Authentication Protocol
Known as:
PAP
, PAP (computer)
A password authentication protocol (PAP) is an authentication protocol that uses a password. PAP is used by Point to Point Protocol to validate users…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Authentication protocol
Challenge-Handshake Authentication Protocol
Extensible Authentication Protocol
Network operating system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Zero Knowledge Password Authentication Protocol
N. Datta
2013
Corpus ID: 16250474
In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with…
Expand
2010
2010
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol
Hanjae Jeong
,
Dongho Won
,
Seungjoo Kim
Journal of information science and engineering
2010
Corpus ID: 7607188
In 2008, Kim-Koc proposed a secure hash-based strong-password authentication protocol using one-time public key cryptography. He…
Expand
2007
2007
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards
Lanlan Hu
,
Xinxin Niu
,
Yixian Yang
International Conference on Multimedia and…
2007
Corpus ID: 8792920
This paper proposes an efficient password authenticated key agreement scheme for multi-server architecture. The proposed scheme…
Expand
2003
2003
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
W. Ku
,
H. Tsai
,
Shuai-Min Chen
OPSR
2003
Corpus ID: 18459047
In 2001, Lin, Sun, and Hwang proposed a strong-password authentication protocol, OSPA, which was later found to be vulnerable to…
Expand
2003
2003
A distributed agent approach to global transportation scheduling
D. Perugini
,
D. Lambert
,
L. Sterling
,
A. Pearce
IEEE/WIC International Conference on Intelligent…
2003
Corpus ID: 27036452
A suitable method for distributed transportation scheduling is necessary for the development of an agent-based logistics support…
Expand
Highly Cited
2000
Highly Cited
2000
Peak-to-average power ratio reduction of an OFDM signal using partial transmit sequences with embedded side information
L. Cimini
,
N. Sollenberger
Global Communications Conference
2000
Corpus ID: 7222209
OFDM is an attractive technique for achieving high-bit-rate wireless data transmission. However, the potentially large peak-to…
Expand
1999
1999
Secure Network Authentication with Password Identification
P. MacKenzie
,
R. Swaminathan
1999
Corpus ID: 17307854
A password authentication protocol called SNAPI is proposed for inclusion in the P1363a document. SNAPI provides mutual…
Expand
1998
1998
Inhaled nitric oxide (NO) for the treatment of early allograft failure after lung transplantation
G. Kemming
,
M. Merkel
,
+9 authors
Munich Lung Transplant Group
Intensive Care Medicine
1998
Corpus ID: 42666725
Objective: Inhalation of high concentrations of nitric oxide (NO) has been shown to improve gas exchange and to reduce pulmonary…
Expand
1997
1997
Performance and implementation of clustered‐OFDM for wireless communications
B. Daneshrad
,
L. Cimini
,
M. Carloni
,
N. Sollenberger
Mob. Networks Appl.
1997
Corpus ID: 12410015
An elegant means by which high‐speed burst wireless transmission can be accomplished with small amounts of overhead is through a…
Expand
Review
1996
Review
1996
Judicial Review in Midpassage: The Uneasy Partnership between Courts and Agencies Plays on
P. Wald
1996
Corpus ID: 152358646
This Legal Scholarship Symposia Articles is brought to you for free and open access by TU Law Digital Commons. It has been…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE