Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,496,418 papers from all fields of science
Search
Sign In
Create Free Account
Password manager
Known as:
Password vault
, Form fillers
, Online password manager
Expand
A password manager is a software application or hardware that helps a user store and organize passwords. Password managers usually store passwords…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
1Password
Authentication
Backup
Biometrics
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Clear, Unambiguous Password Policies: An Oxymoron?
M. Steves
,
Kevin S. Killourhy
,
M. Theofanos
Interacción
2014
Corpus ID: 10859968
Password policies – documents which regulate how users must create and manage their passwords – can have complex and unforeseen…
Expand
2014
2014
Authentication Mechanism for Resistance to Password Stealing and Reuse Attack
Sharayu A. Aghav
,
RajneeshKaur Bedi
arXiv.org
2014
Corpus ID: 6960206
Considering computer systems, security is the major concern with usability. Security policies need to be developed to protect…
Expand
Review
2013
Review
2013
On user perception of safety in online social networks
C. Lorentzen
,
M. Fiedler
,
H. Johnson
Int. J. Commun. Networks Distributed Syst.
2013
Corpus ID: 22486566
Today, many people share personal information through online social networks, and thus they are exposed to the risk to get their…
Expand
2013
2013
Password management system
邵宇
,
李刚
,
汪长洪
,
苏杰
2013
Corpus ID: 196074501
The invention discloses a password management system. The password management system comprises a fingerprint acquisition module…
Expand
2009
2009
A Novel Approach for Password Strength Analysis through Support Vector Machine
K. Jamuna
,
S. Karpagavalli
,
M. Vijaya
,
G. Govindarajulu
2009
Corpus ID: 17440962
Passwords are ubiquitous authentication methods and they represent the identity of an individual for a system. Users are…
Expand
2009
2009
Predictive Models of Form Filling
M. Redmond
,
M. Redmond
2009
Corpus ID: 16642583
In this paper we investigate predictive models of form filling. A predictive model of form filling aims to reduce the amount of…
Expand
2008
2008
Design of a secure chat application based on AES cryptographic algorithm and key management
N. Bardis
,
Konstantinos Ntaikos
2008
Corpus ID: 56248307
This article presents the design and implementation of a software application for the provision of secure real time communication…
Expand
2007
2007
Bonding Material Coated Clay for Improving Paper Properties
Se-Young Yoon
2007
Corpus ID: 138627985
Starch-clay composites with different aggregates sizes and starch to clay ratios were prepared by a precipitation method. The…
Expand
2007
2007
A Usability Study of an Access Control System for Group Blogs
Indratmo
,
Julita Vassileva
International Conference on Web and Social Media
2007
Corpus ID: 14078045
Blogs are a medium to express thoughts, feelings, and opinions. Once published, blog articles potentially become persistent and…
Expand
Review
2005
Review
2005
A Wristwatch-Computer Based Password-Vault
C. Narayanaswami
,
M. Raghunath
2005
Corpus ID: 18960544
Passwords are a popular means of access control to internet services. Unfortunately, during the last few years there has been a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE