Password (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Password" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
153rd place
151st place
11th place
8th place
3rd place
3rd place
193rd place
152nd place
8,888th place
6,276th place
355th place
454th place
272nd place
225th place
5th place
5th place
207th place
136th place
7th place
7th place
1,060th place
700th place
low place
low place
low place
low place
low place
low place
1,216th place
797th place
670th place
480th place
786th place
558th place
79th place
65th place
low place
low place
274th place
309th place
low place
low place
216th place
186th place
low place
low place
low place
low place
4,362nd place
3,162nd place
61st place
54th place
2,573rd place
1,594th place
low place
low place
8th place
10th place
low place
low place
800th place
676th place
12th place
11th place
low place
low place
low place
low place
5,739th place
4,857th place
5,990th place
3,752nd place
low place
low place
1,185th place
840th place
54th place
48th place
low place
low place
low place
low place
1,317th place
873rd place
low place
low place
low place
low place
low place
low place
38th place
40th place
388th place
265th place
low place
low place
2,613th place
2,294th place
433rd place
284th place
low place
8,773rd place
332nd place
246th place
low place
low place
474th place
329th place
low place
low place
low place
low place
1,332nd place
708th place
5,032nd place
3,357th place
18th place
17th place
low place
low place
low place
low place
2,435th place
1,699th place
low place
low place
9,720th place
6,596th place
low place
low place
1,182nd place
725th place
14th place
14th place
1,131st place
850th place
5,196th place
3,635th place
2,429th place
1,561st place
low place
low place
low place
low place

about.com

ancienthistory.about.com

acm.org

dl.acm.org

archive.today

  • Kok-Wah Lee "Methods and Systems to Create Big Memorizable Secrets and Their Applications" Patent US20110055585, WO2010010430. Filing date: 18 December 2008

arstechnica.com

bbc.co.uk

news.bbc.co.uk

bell-labs.com

cm.bell-labs.com

books.google.com

broadcom.com

community.broadcom.com

bugcharmer.blogspot.com

burtleburtle.net

businesstoday.in

cam.ac.uk

cl.cam.ac.uk

cert.org

cesg.gov.uk

cnet.com

news.cnet.com

cnet.com

codehaus.org

jira.codehaus.org

computer.org

computerworld.com

cornell.edu

rist.tech.cornell.edu

cryptosmith.com

darkreading.com

doi.org

  • Ranjan, Pratik; Om, Hari (6 May 2016). "An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem". Wireless Personal Communications. 90 (1): 217–244. doi:10.1007/s11277-016-3342-5. ISSN 0929-6212. S2CID 21912076.
  • Grassi, Paul A.; Garcia, Michael E.; Fenton, James L. (June 2017). "NIST Special Publication 800-63-3: Digital Identity Guidelines". National Institute of Standards and Technology (NIST). doi:10.6028/NIST.SP.800-63-3. Retrieved 17 May 2019. {{cite journal}}: Cite journal requires |journal= (help)
  • Morris, Robert & Thompson, Ken (1979). "Password Security: A Case History". Communications of the ACM. 22 (11): 594–597. CiteSeerX 10.1.1.135.2097. doi:10.1145/359168.359172. S2CID 207656012. Archived from the original on 22 March 2003.
  • P. Tsokkis and E. Stavrou, "A password generator tool to increase users' awareness on bad password construction strategies", 2018 International Symposium on Networks, Computers and Communications (ISNCC), Rome, 2018, pp. 1-5, doi:10.1109/ISNCC.2018.8531061.
  • T Matsumoto. H Matsumotot; K Yamada & S Hoshino (2002). Van Renesse, Rudolf L. (ed.). "Impact of artificial 'Gummy' Fingers on Fingerprint Systems". Proc SPIE. Optical Security and Counterfeit Deterrence Techniques IV. 4677: 275. Bibcode:2002SPIE.4677..275M. doi:10.1117/12.462719. S2CID 16897825.
  • Bonneau, Joseph; Herley, Cormac; Oorschot, Paul C. van; Stajano, Frank (2012). "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes". Technical Report - University of Cambridge. Computer Laboratory. Cambridge, UK: University of Cambridge Computer Laboratory. doi:10.48456/tr-817. ISSN 1476-2986. Retrieved 22 March 2019.
  • Bonneau, Joseph; Herley, Cormac; Oorschot, Paul C. van; Stajano, Frank (2012). "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes". 2012 IEEE Symposium on Security and Privacy. 2012 IEEE Symposium on Security and Privacy. San Francisco, CA. pp. 553–567. doi:10.1109/SP.2012.44. ISBN 978-1-4673-1244-8.

espacenet.com

worldwide.espacenet.com

  • US patent 8046827 

fedscoop.com

fidoalliance.org

forbes.com

fortune.com

gizmodo.com

harvard.edu

ui.adsabs.harvard.edu

  • T Matsumoto. H Matsumotot; K Yamada & S Hoshino (2002). Van Renesse, Rudolf L. (ed.). "Impact of artificial 'Gummy' Fingers on Fingerprint Systems". Proc SPIE. Optical Security and Counterfeit Deterrence Techniques IV. 4677: 275. Bibcode:2002SPIE.4677..275M. doi:10.1117/12.462719. S2CID 16897825.

iacr.org

eprint.iacr.org

ibm.com

www-03.ibm.com

imperva.com

imperva.com

blog.imperva.com

itpro.co.uk

kiplinger.com

lyquix.com

macworld.com

marketwire.com

mcpmag.com

microsoft.com

research.microsoft.com

support.microsoft.com

modernlifeisrubbish.co.uk

ncl.ac.uk

homepages.cs.ncl.ac.uk

nist.gov

csrc.nist.gov

pages.nist.gov

nytimes.com

patents.google.com

  • Kok-Wah Lee "Methods and Systems to Create Big Memorizable Secrets and Their Applications" Patent US20110055585, WO2010010430. Filing date: 18 December 2008

pcmag.com

pcworld.com

psu.edu

citeseerx.ist.psu.edu

pythonhosted.org

sans.org

schneier.com

securitybrief.co.nz

semanticscholar.org

api.semanticscholar.org

  • Ranjan, Pratik; Om, Hari (6 May 2016). "An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem". Wireless Personal Communications. 90 (1): 217–244. doi:10.1007/s11277-016-3342-5. ISSN 0929-6212. S2CID 21912076.
  • Morris, Robert & Thompson, Ken (1979). "Password Security: A Case History". Communications of the ACM. 22 (11): 594–597. CiteSeerX 10.1.1.135.2097. doi:10.1145/359168.359172. S2CID 207656012. Archived from the original on 22 March 2003.
  • T Matsumoto. H Matsumotot; K Yamada & S Hoshino (2002). Van Renesse, Rudolf L. (ed.). "Impact of artificial 'Gummy' Fingers on Fingerprint Systems". Proc SPIE. Optical Security and Counterfeit Deterrence Techniques IV. 4677: 275. Bibcode:2002SPIE.4677..275M. doi:10.1117/12.462719. S2CID 16897825.

sleuthsayers.org

sophos.com

nakedsecurity.sophos.com

springer.com

link.springer.com

  • Ranjan, Pratik; Om, Hari (6 May 2016). "An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem". Wireless Personal Communications. 90 (1): 217–244. doi:10.1007/s11277-016-3342-5. ISSN 0929-6212. S2CID 21912076.

std.com

world.std.com

techlicious.com

techtarget.com

searchsecurity.techtarget.com

theguardian.com

theregister.co.uk

thireus.com

blog.thireus.com

time.com

techland.time.com

trendmicro.com

troyhunt.com

uio.no

folk.uio.no

usenix.org

waelchatila.com

web.archive.org

wired.com

worldcat.org

search.worldcat.org

  • Ranjan, Pratik; Om, Hari (6 May 2016). "An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem". Wireless Personal Communications. 90 (1): 217–244. doi:10.1007/s11277-016-3342-5. ISSN 0929-6212. S2CID 21912076.
  • Bonneau, Joseph; Herley, Cormac; Oorschot, Paul C. van; Stajano, Frank (2012). "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes". Technical Report - University of Cambridge. Computer Laboratory. Cambridge, UK: University of Cambridge Computer Laboratory. doi:10.48456/tr-817. ISSN 1476-2986. Retrieved 22 March 2019.

wsj.com

xpreeli.com

yahoo.com

zdnet.com