Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,101,588 papers from all fields of science
Search
Sign In
Create Free Account
Password management
Known as:
Privileged password management
There are several forms of software used to help users or organizations better manage passwords: * Intended for use by a single user: * Password…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Control panel (software)
KYPS
Linux Unified Key Setup
Password
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Information hiding through dynamic text steganography and cryptography: Computing and Informatics
D. Bhat
,
V. Krithi
,
Manjunath K N
,
S. Prabhu
,
A. Renuka
International Conference on Advances in Computing…
2017
Corpus ID: 20047475
Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people…
Expand
2015
2015
Cyber (In-)security of Industrial Control Systems: A Societal Challenge
E. Luiijf
International Conference on Computer Safety…
2015
Corpus ID: 30070682
Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures CI, their products…
Expand
2015
2015
Cloud Docs: Secure Scalable Document Sharing on Public Clouds
C. Wise
,
Carsten Friedrich
,
S. Nepal
,
Shiping Chen
,
R. Sinnott
IEEE International Conference on Cloud Computing
2015
Corpus ID: 2859281
Secure cloud storage solutions such as Trust Store, Sec Cloud, HPI Secure, and Twin Cloud have primarily focused on securing…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
2008
2008
Password Management for EPC Class 1 Generation 2 Transponders
Claus Wonnemann
,
Jens Strüker
10th IEEE Conference on E-Commerce Technology and…
2008
Corpus ID: 40351847
RFID systems compliant to the widely-used standard EPC class 1 generation 2 lack effective security mechanisms. We show that…
Expand
2007
2007
Communication Security
Todd Exum
,
P. Lunsford
2007
Corpus ID: 16559412
2006
2006
Quality of password management policy
Carlos Villarrubia
,
E. Fernández-Medina
,
M. Piattini
ARES
2006
Corpus ID: 15180753
The use of passwords is the most common method to carry out the authentication of users in information systems. For this reason…
Expand
2005
2005
Grid-enabled Probabilistic Model Checking with PRISM
Yi Zhang
,
D. Parker
,
M. Kwiatkowska
2005
Corpus ID: 2313694
In this paper, we present our work on extending the probabilistic model checking tool PRISM with Grid computing capabilities…
Expand
2005
2005
User and Password Security
J. L. Harrington
2005
Corpus ID: 59780436
1995
1995
SPM: System for Password Management
Michael A. Cooper
LiSA
1995
Corpus ID: 40111412
Most UNIX operating systems are not delivered with adequate facilities to address password management in medium to large…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE