Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,160,782 papers from all fields of science
Search
Sign In
Create Free Account
Password
Known as:
Computer password
, Password (disambiguation)
, Contraseña
Expand
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3-D Secure
Apache Velocity
Backup
Bcrypt
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
The security of modern password expiration: an algorithmic framework and empirical analysis
Yinqian Zhang
,
F. Monrose
,
M. Reiter
Conference on Computer and Communications…
2010
Corpus ID: 555580
This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely…
Expand
Highly Cited
2007
Highly Cited
2007
S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme
Huanyu Zhao
,
Xiaolin Li
21st International Conference on Advanced…
2007
Corpus ID: 7815763
The vulnerabilities of the textual password have been well known. Users tend to pick short passwords or passwords that are easy…
Expand
Highly Cited
2006
Highly Cited
2006
Design and evaluation of a shoulder-surfing resistant graphical password scheme
S. Wiedenbeck
,
J. Waters
,
Leonardo Sobrado
,
J. Birget
International Working Conference on Advanced…
2006
Corpus ID: 13823856
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can…
Expand
Highly Cited
2005
Highly Cited
2005
Simple Password-Based Encrypted Key Exchange Protocols
Michel Abdalla
,
D. Pointcheval
The Cryptographer's Track at RSA Conference
2005
Corpus ID: 8087962
Password-based encrypted key exchange are protocols that are designed to provide pair of users communicating over an unreliable…
Expand
Highly Cited
2005
Highly Cited
2005
Authentication using graphical passwords: effects of tolerance and image choice
S. Wiedenbeck
,
J. Waters
,
J. Birget
,
A. Brodskiy
,
N. Memon
Symposium On Usable Privacy and Security
2005
Corpus ID: 1128135
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather…
Expand
Highly Cited
2005
Highly Cited
2005
Stronger Password Authentication Using Browser Extensions
B. Ross
,
Collin Jackson
,
N. Miyake
,
D. Boneh
,
John C. Mitchell
USENIX Security Symposium
2005
Corpus ID: 12019773
We describe a browser extension, PwdHash, that transparently produces a different password for each site, improving web password…
Expand
Highly Cited
2003
Highly Cited
2003
Comparing passwords, tokens, and biometrics for user authentication
L. O'Gorman
Proceedings of the IEEE
2003
Corpus ID: 11397126
For decades, the password has been the standard means for user authentication on computers. However, as users are required to…
Expand
Highly Cited
2003
Highly Cited
2003
Security proofs for an efficient password-based key exchange
E. Bresson
,
O. Chevassut
,
D. Pointcheval
Conference on Computer and Communications…
2003
Corpus ID: 2629117
Password-based key exchange schemes are designed to provide entities communicating over a public network, and sharing a (short…
Expand
Highly Cited
2003
Highly Cited
2003
Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
Klaus Finkenzeller
2003
Corpus ID: 261753296
RFID (Radio Frequency Identification) is used in all areas of automatic data capture allowing contactless identification of…
Expand
Highly Cited
1999
Highly Cited
1999
Password hardening based on keystroke dynamics
F. Monrose
,
M. Reiter
,
S. Wetzel
Conference on Computer and Communications…
1999
Corpus ID: 1373380
Abstract.We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE