Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 235,061,282 papers from all fields of science
Search
Sign In
Create Free Account
Password
Known as:
Computer password
, Password (disambiguation)
, Contraseña
Expand
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3-D Secure
Apache Velocity
Backup
Bcrypt
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Enhanced Security for Cloud Storage using File Encryption
Debajyoti Mukhopadhyay
,
Gitesh Sonawane
,
P. Gupta
,
Sagar Bhavsar
,
Vibha Mittal
arXiv.org
2013
Corpus ID: 20123161
Cloud computing is a term coined to a network that offers incredible processing power, a wide array of storage space and…
Expand
2013
2013
Self-Encrypting Disks pose Self-Decrypting Risks How to break Hardware-based Full Disk Encryption
Tilo Müller
,
Tobias Latzo
,
F. Freiling
,
Friedrich-Alexander
2013
Corpus ID: 53407224
Hardware-based full disk encryption (FDE) drives, such as Intel’s SSD 320 and 520 series, are widely believed to be a fast and…
Expand
2011
2011
Online or face-to-face? An experimental study of examiner training
Suzanne Chamberlain
,
R. Taylor
British Journal of Educational Technology
2011
Corpus ID: 205567797
Thousands of examiners are employed to mark candidate scripts from the suite of public examinations offered to students during…
Expand
2010
2010
Web Service Based Secure E-Learning Management System- EWeMS
M. Basha
,
D. Ponnurangam
J. Convergence Inf. Technol.
2010
Corpus ID: 2537544
Technology has eroded the learning strategy from beneath the apple tree to learn any where at any time. The learners do not have…
Expand
2006
2006
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Debasis Giri
,
P. D. Srivastava
IACR Cryptology ePrint Archive
2006
Corpus ID: 30645
Manik et al. [3] proposed a novel remote user authentication scheme using bilinear pairings. Recently, Fang et al [15] analyzed…
Expand
Review
2006
Review
2006
The Building Information Model in Facilities Management
R. Mendez
2006
Corpus ID: 149792238
.............................................................................................................................. ii…
Expand
2005
2005
SafeSMS - end-to-end encryption for SMS
M. Hassinen
Proceedings of the 8th International Conference…
2005
Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to…
Expand
2004
2004
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract)
S. Stubblebine
,
P. V. Oorschot
Financial Cryptography
2004
Corpus ID: 11538547
Pinkas and Sander's (2002) login protocol protects against online guessing attacks by employing human-in-the-loop techniques…
Expand
2002
2002
The secure DHCP system with user authentication
Tadashi Komori
,
Takamichi Saito
27th Annual IEEE Conference on Local Computer…
2002
Corpus ID: 12781935
DHCP (dynamic host configuration protocol) makes it easy to access an IP network. However, since the DHCP itself does not have an…
Expand
1999
1999
The Role of Technology in Learning: Managing to Achieve a Vision
R. Lewis
British Journal of Educational Technology
1999
Corpus ID: 15824387
The paper explores the current context for uses of technology in education, including the nature of work, the capabilities…
Expand