Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,286,837 papers from all fields of science
Search
Sign In
Create Free Account
Password (video gaming)
Known as:
Password (disambiguation)
, Password (video games)
, Password save
In many video games of the 8-bit and, to a lesser extent, 16-bit eras (third and fourth generations), after a level was beaten and/or when all…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
.hack
Algorithm
Around the World in 80 Days
Ganso Saiyūki: Super Monkey Daibōken
Expand
Broader (1)
Video game design
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Input Password Using Simple Input Device
M. Okamoto
Future Technologies Conference
2018
Corpus ID: 69263477
Password-based authentication is a basic technique that is used for user authentication in information technology. However…
Expand
2018
2018
Graphical Password with Convex
Hull
2018
Corpus ID: 56246591
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can…
Expand
2016
2016
Data Security in Cloud using Multi Modal Biocryptographic Authentication
P. Selvarani
,
N. Malarvizhi
2016
Corpus ID: 63464679
Objectives: Higher data security can be achieved by using Multimodal bio cryptographic technique for data encryption and…
Expand
2016
2016
https password save bookmarklet | Ejectamenta
Dave Watts
2016
Corpus ID: 59772079
2010
2010
Input precision for gaze-based graphical passwords
Alain Forget
,
Sonia Chiasson
,
R. Biddle
CHI Extended Abstracts
2010
Corpus ID: 6693456
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable…
Expand
2010
2010
Password Protected? Can a Password Save Your Cell Phone from the Search Incident to Arrest Doctrine?
Adam M. Gershowitz
2010
Corpus ID: 108480624
Over the last few years, dozens of courts have authorized police to conduct warrantless searches of cell phones when arresting…
Expand
Review
2008
Review
2008
Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology
W. Jansen
2008
Corpus ID: 113480742
Cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly mobile workforce. Small and…
Expand
2005
2005
Mobile Password System for Enhancing Usability-Guaranteed Security in Mobile Phone Banking
Sang Jun Lee
,
S. Park
International Conference on Human System…
2005
Corpus ID: 206587358
To use mobile phone banking, we have to input personal identification number, account password and security card number. When it…
Expand
2005
2005
The N/R one time password system
Vipul Goyal
,
A. Abraham
,
S. Sanyal
,
Sang-Yong Han
International Conference on Information…
2005
Corpus ID: 18613280
A new one time password system is described which is secure against eavesdropping and server database compromise at the same time…
Expand
2003
2003
Building a management information system
N. Burford
2003
Corpus ID: 56603331
Statistics are an important tool in management decision-making. Every area of the library performs work that is measurable in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE