Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,209,458 papers from all fields of science
Search
Sign In
Create Free Account
Password
Known as:
Computer password
, Password (disambiguation)
, Contraseña
Expand
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3-D Secure
Apache Velocity
Backup
Bcrypt
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Security improvement on an anonymous key agreement protocol based on chaotic maps
Kaiping Xue
,
P. Hong
2012
Corpus ID: 62596927
Highly Cited
2010
Highly Cited
2010
T UTORIAL Playful Machines Theoretical Foundation and Practical Realization of Self-Organizing Robots
R. Der
,
G. Martius
2010
Corpus ID: 20823124
,
Highly Cited
2010
Highly Cited
2010
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang
,
Ya-Fen Chang
,
Chun-Hung Liu
Sixth International Conference on Intelligent…
2010
Corpus ID: 12519035
Wireless sensor networks are widely used for applications such as environmental monitoring, airport safety, health care, etc. For…
Expand
Highly Cited
2006
Highly Cited
2006
A novel remote user authentication scheme using bilinear pairings
M. Das
,
A. Saxena
,
V. Gulati
,
D. B. Phatak
Computers & security
2006
Corpus ID: 14594801
Highly Cited
2005
Highly Cited
2005
Improvement of Chien et al.'s remote user authentication scheme using smart cards
Sung-Woon Lee
,
Hyun-Sung Kim
,
K. Yoo
Comput. Stand. Interfaces
2005
Corpus ID: 26738179
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
2003
Highly Cited
2003
A new remote user authentication scheme for multi-server architecture
I. Lin
,
M. Hwang
,
Li-Hua Li
Future generations computer systems
2003
Corpus ID: 12634100
Highly Cited
2003
Highly Cited
2003
A user friendly remote authentication scheme with smart cards
Shyi-Tsong Wu
,
Bin-Chang Chieu
Computers & security
2003
Corpus ID: 33553150
Highly Cited
2002
Highly Cited
2002
A simple remote user authentication scheme
M. Hwang
,
Cheng-Chi Lee
,
Yuan-Liang Tang
2002
Corpus ID: 60863308
Review
2001
Review
2001
Security for Mobility
H. R. Nielson
,
F. Nielson
,
Mikael Buchholtz
Foundations of Security Analysis and Design
2001
Corpus ID: 26378404
We show how to use static analysis to provide information about security issues related to mobility. First the syntax and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE