Semantic Scholar uses AI to extract papers important to this topic.
Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords… Expand We describe a browser extension, PwdHash, that transparently produces a different password for each site, improving web password… Expand The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to… Expand Users rarely choose passwords that are both hard to guess and easy to remember. To determine how to help users choose good… Expand Graphical password schemes have been proposed as an alternative to text passwords in applications that support graphics and mouse… Expand There has been much interest in password-authenticated key-exchange protocols which remain secure even when users choose… Expand When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using… Expand The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries… Expand A method of user password authentication is described which is secure even if an intruder can read the system's data, and can… Expand This paper describes the history of the design of the password security scheme on a remotely accessed time-sharing system. The… Expand