Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,467 papers from all fields of science
Search
Sign In
Create Free Account
Secure Password Authentication
Known as:
SPA
Secure Password Authentication (SPA) is a proprietary Microsoft protocol used to authenticate Microsoft email clients with an electronic mail server…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Email
Integrated Windows Authentication
Outline of computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks”
I. You
,
Fang-Yie Leu
IEEE Systems Journal
2018
Corpus ID: 4323246
Recently, Chuang et al. have introduced a secure password authentication mechanism for seamless handover in Proxy Mobile IPv6…
Expand
2015
2015
Analisis Spa Bayi dengan Kualitas Tidur Bayi di Lolypop Kids and Baby Spa Medan
Siti Fatimah Lubis
2015
Corpus ID: 193517376
2014
2014
Naturally Hard Steel Rails: Development and Feedback from Service
A. Bracciali
,
F. Piccioli
2014
Corpus ID: 59027936
Rail life in service can be strongly reduced by both excessive wear and extensive rolling contact fatigue (RCF) damage. Although…
Expand
2008
2008
Breaking a Smart Card based Secure Password Authentication Scheme
Eunjun Yoon
,
K. Yoo
International Symposium on Algorithms
2008
Corpus ID: 18208996
Recently, Wang-Chang proposed a password authentication scheme for implementing a remote access network system whose security…
Expand
2008
2008
A new secure password authentication scheme using smart cards
Bangju Wang
,
Yuhua Wang
,
Huanguo Zhang
Wuhan University Journal of Natural Sciences
2008
Corpus ID: 21507282
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card…
Expand
2008
2008
A New Improved Secure Password Authentication Protocol to Resist Guessing Attack in Wireless Networks
Y. Lee
,
Y. Hsieh
,
P. You
2008
Corpus ID: 3501484
Wireless communication is widely used today. It transmits information through an open network such that it always suffers by a…
Expand
2007
2007
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise
Hongfeng Zhu
,
Tianhua Liu
,
Jie Liu
,
G. Chang
Pacific Rim International Symposium on Dependable…
2007
Corpus ID: 9568385
With rapid changes in the modern communication environment such as ad hoc networks and ubiquitous computing, it is necessary to…
Expand
2006
2006
Secure Password Authentication for Distributed Computing
S. Jung
,
Souhwan Jung
International Conference on Computational…
2006
Corpus ID: 12785423
This paper describes secure password-based authentication involving a trusted third party, while the previous secure password…
Expand
2006
2006
Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR)
Chun-Li Lin
,
Ching-Po Hung
IEICE transactions on communications
2006
Corpus ID: 41532887
In 2004, Tsuji and Shimizu proposed a one-time password authentication protocol, named 2GR (Two-Gene-Relation password…
Expand
2006
2006
Secure Password Authentication Protocol in Wireless Networks
Eunjun Yoon
,
K. Yoo
International Conference on Next Generation Web…
2006
Corpus ID: 2637999
In 2006, Ma et al. found flaws in the original and fixed versions of the PAP protocol by using a new knowledge-based framework…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE