Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,380,856 papers from all fields of science
Search
Sign In
Create Free Account
Password
Known as:
Computer password
, Password (disambiguation)
, Contraseña
Expand
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3-D Secure
Apache Velocity
Backup
Bcrypt
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Online or face-to-face? An experimental study of examiner training
Suzanne Chamberlain
,
R. Taylor
British Journal of Educational Technology
2011
Corpus ID: 205567797
Thousands of examiners are employed to mark candidate scripts from the suite of public examinations offered to students during…
Expand
2010
2010
Web Service Based Secure E-Learning Management System- EWeMS
M. Basha
,
D. Ponnurangam
J. Convergence Inf. Technol.
2010
Corpus ID: 2537544
Technology has eroded the learning strategy from beneath the apple tree to learn any where at any time. The learners do not have…
Expand
2008
2008
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
IACR Cryptology ePrint Archive
2008
Corpus ID: 8998539
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret…
Expand
2006
2006
Model Driven Development of Service-Oriented Grid Applications
Matthew Smith
,
T. Friese
,
Bernd Freisleben
Advanced Int'l Conference on Telecommunications…
2006
Corpus ID: 1402823
In service-oriented Grid computing, great emphasis is placed on platform independence and cross-platform interoperability at the…
Expand
2006
2006
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Debasis Giri
,
P. D. Srivastava
IACR Cryptology ePrint Archive
2006
Corpus ID: 30645
Manik et al. [3] proposed a novel remote user authentication scheme using bilinear pairings. Recently, Fang et al [15] analyzed…
Expand
Review
2006
Review
2006
The Building Information Model in Facilities Management
R. Mendez
2006
Corpus ID: 149792238
.............................................................................................................................. ii…
Expand
2005
2005
SafeSMS - end-to-end encryption for SMS
M. Hassinen
Proceedings of the 8th International Conference…
2005
Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to…
Expand
2002
2002
The secure DHCP system with user authentication
Tadashi Komori
,
Takamichi Saito
27th Annual IEEE Conference on Local Computer…
2002
Corpus ID: 12781935
DHCP (dynamic host configuration protocol) makes it easy to access an IP network. However, since the DHCP itself does not have an…
Expand
1999
1999
The Role of Technology in Learning: Managing to Achieve a Vision
R. Lewis
British Journal of Educational Technology
1999
Corpus ID: 15824387
The paper explores the current context for uses of technology in education, including the nature of work, the capabilities…
Expand
Highly Cited
1989
Highly Cited
1989
OSPF specification
Request for Comments
1989
Corpus ID: 37772689
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE