Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,279,148 papers from all fields of science
Search
Sign In
Create Free Account
Password management
Known as:
Privileged password management
There are several forms of software used to help users or organizations better manage passwords: * Intended for use by a single user: * Password…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Control panel (software)
KYPS
Linux Unified Key Setup
Password
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Can We Nudge Users Toward Better Password Management?: An Initial Study
Shipi Kankane
,
C. DiRusso
,
Christen Buckley
CHI Extended Abstracts
2018
Corpus ID: 5094854
Nudge theory has been widely used in government and health interventions for the subtlety with which it positively influences…
Expand
Review
2018
Review
2018
Exploring the effect of uncertainty avoidance on taking voluntary protective security actions
Salvatore Aurigemma
,
Thomas Mattson
Computers & security
2018
Corpus ID: 43901714
2017
2017
Developing an Information Security Policy: A Case Study Approach
F. Alqahtani
2017
Corpus ID: 64674163
2014
2014
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications
Yong Li
,
Yuanyuan Zhang
,
Juanru Li
,
Dawu Gu
International Conference on Network and System…
2014
Corpus ID: 11892386
Cryptography is the common means to achieve strong data protection in mobile applications. However, cryptographic misuse is…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
Review
2011
Review
2011
A Field Study of User Behavior and Perceptions in Smartcard Authentication
C. L. Paul
,
E. Morse
,
Aiping Zhang
,
Yee-Yin Choong
,
M. Theofanos
IFIP TC13 International Conference on Human…
2011
Corpus ID: 12687308
A field study of 24 participants over 10 weeks explored user behavior and perceptions in a smartcard authentication system…
Expand
Review
2008
Review
2008
An Empirical Assessment of Factors Impeding Effective Password Management
H. Kruger
,
T. Steyn
,
B. Dawn Medlin
,
L. Drevin
2008
Corpus ID: 54743087
Abstract Since passwords are one of the main mechanisms used to protect data and information, it is important to ensure that…
Expand
Highly Cited
2007
Highly Cited
2007
Practical Minimalist Cryptography for RFID Privacy
Marc Langheinrich
,
R. Marti
IEEE Systems Journal
2007
Corpus ID: 2480393
The fear of unauthorized, hidden readouts has dominated the radio frequency identification (RFID) privacy debate. Virtually all…
Expand
2005
2005
Grid-enabled Probabilistic Model Checking with PRISM
Yi Zhang
,
D. Parker
,
M. Kwiatkowska
2005
Corpus ID: 2313694
In this paper, we present our work on extending the probabilistic model checking tool PRISM with Grid computing capabilities…
Expand
Highly Cited
1998
Highly Cited
1998
Intermediaries: New Places for Producing and Manipulating Web Content
Rob Barrett
,
P. Maglio
Comput. Networks
1998
Corpus ID: 293889
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE