password

Definitions

  • WordNet 3.6
    • n password a secret word or phrase known only to a restricted group "he forgot the password"
    • ***
Webster's Revised Unabridged Dictionary
    • n Password A word to be given before a person is allowed to pass; a watchword; a countersign.
    • ***
Century Dictionary and Cyclopedia
    • n password A secret parole or countersign by which a friend may be distinguished from a stranger, and allowed to pass.
    • ***
Chambers's Twentieth Century Dictionary
    • Password (mil.) a private word by which a friend is distinguishable from a stranger, enabling one to pass or enter a camp, &c
    • ***

Etymology

Chambers's Twentieth Century Dictionary
O. Fr. passer—It. passarepassus, a step.

Usage

In literature:

It was a secret society of 'Hunters' Lodges,' with ritual, passwords, degrees.
"The Winning of Popular Government" by Archibald Macmechan
So you know the password.
"In the Heart of a Fool" by William Allen White
I gave the password, as instructed by Danny Randall.
"Gold" by Stewart White
All races belong to it, and its passwords are accepted in every capital.
"The So-called Human Race" by Bert Leston Taylor
Why have you not the new password, Excellency?
"The Red Symbol" by John Ironside
He got the password and snapped permission to advance.
"A Yankee Flier in Italy" by Rutherford G. Montgomery
It contained the password to be used that night at the Louvre.
"Blackwood's Edinburgh Magazine, Volume 58, No. 359, September 1845" by Various
The magic password of the Arabian bade the rugged mountain open, and admitted him to the midst of glittering jewels.
"The Revival of Irish Literature" by Charles Gavan Duffy
The sound of many feet, the challenge, and the password sounded overhead along the battlements; the watch was being changed.
"The Black Arrow" by Robert Louis Stevenson
They have no signs or passwords, but simply a general agreement.
"Gabriel Tolliver" by Joel Chandler Harris
***

In poetry:

He will hum, as he enters, the password,
And they—they will nod in the sun,
Then stand again to their duty,
And this is all that is done.
"The Message Of The Bee" by Alexander Anderson
Hide in thine own soul, and surprise
The password of the unwary elves;
Seek it, thou canst not bribe their spies;
Unsought, they whisper it themselves.
"The Foot-Path" by James Russell Lowell
Wheat, Wheat, Wheat! Oh, the people have to eat!
An' you're servin', an' deservin' of a velvet-cushion seat
In the cocky-farmers' heaven when you come to throw a seven;
An' your password at the portal will be, "Wheat, Wheat, Wheat."
"Wheat" by C J Dennis

In news:

With an eye toward the enterprise, Verbatim includes hardware encryption and password protection in its new flash drives.
People involved in an online government identity system say passwords could be on their way out.
The term spyware covers a wide range of threats: nearly mainstream services that display ads, programs that co-opt search results, keyloggers that steal your passwords, even Trojan horses that open your system to hacking.
Criminals had bank's security boss on board and a list of passwords at their fingertips.
The password field is case sensitive.
Mozilla pulled a malicious add-on for Firefox that it says was found to be stealing password information from users.
A new report on the devastating RockYou breach finds that password security is stuck in the 90s.
99.8 percent of passwords are welcome mats.
Twitter users were surprised to find their passwords reset by the company Wednesday night and Thursday morning, which the company said in emails to the affected accounts was due to passwords being compromised.
A Password Hacker in Action.
How to Survive the Password Apocalypse.
People hide passwords in safe places (or so they think.
) Passwords to on-line sites, bank cards, bank accounts, and more.
People feel their passwords are secure, and the hiding places are known only to them.
All usernames and passwords are case-sensitive.
***

In science:

The attacker then infers that A is not the real password, and that there is an equal chance of 50% that the password is either B or C .
Refining a Quantitative Information Flow Metric
H against each other only, instead of against the high state (which is C as the correct password in our example).
Refining a Quantitative Information Flow Metric
The range ̺R reported by R is plausible if we remember that the size of the password p is 1.5849 bits.
Refining a Quantitative Information Flow Metric
QU AN max ≤ η and QU AN min ≥ −η However, if we merely look at the attacker’s prebelief and postbelief in C , as the correct password, we realize that the attacker’s belief has approached reality from interacting with PW C .
Refining a Quantitative Information Flow Metric
The criteria of usability and security do not compete in PKA systems as in password-based schemes.
KeyAuth: Bringing Public-key Authentication to the Masses
***