Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Password management

Known as: Privileged password management 
There are several forms of software used to help users or organizations better manage passwords: * Intended for use by a single user: * Password… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
  • F. Stajano
  • Security Protocols Workshop
  • 2011
  • Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for… Expand
  • table 1
  • figure 1
Highly Cited
2010
Highly Cited
2010
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
Highly Cited
2010
Highly Cited
2010
Despite technological advances, humans remain the weakest link in Internet security. In this study, we examined five password… Expand
Highly Cited
2009
Highly Cited
2009
As one of the most common authentication methods, passwords help secure information by granting access only to authorized parties… Expand
Highly Cited
2006
Highly Cited
2006
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Highly Cited
2006
Highly Cited
2006
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Highly Cited
2005
Highly Cited
2005
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
2005
2005
In this paper, we present our work on extending the probabilistic model checking tool PRISM with Grid computing capabilities… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
Highly Cited
2001
Highly Cited
2001
The security research community has recently recognised that user behaviour plays a part in many security failures, and it has… Expand
  • figure 2
  • figure 1
1991
1991
  • M. Bishop
  • COMPCON Spring '91 Digest of Papers
  • 1991
  • Corpus ID: 42099162
Problems of password selection and password management are discussed. Using a simple yet powerful model, the author describes… Expand