<--- Back to Details
First PageDocument Content
Cryptography / Password / Identity management systems / Passphrase / Two-factor authentication / OTPW / Password strength / Security / Computer security / Access control
Date: 2006-02-20 19:47:30
Cryptography
Password
Identity management systems
Passphrase
Two-factor authentication
OTPW
Password strength
Security
Computer security
Access control

Usable Privacy & Security I - Scribe Notes

Add to Reading List

Source URL: cups.cs.cmu.edu

Download Document from Source Website

File Size: 24,80 KB

Share Document on Facebook

Similar Documents

Cryptography / Computer access control / Computer security / Password / Security / Draw a Secret / Crypt / Key / Password strength / OTPW

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

DocID: 1qnKy - View Document

Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

DocID: 1lTzP - View Document

Computer access control / Computer security / Access control / Identity management / Cryptographic software / Cryptography / Federated identity / Password / Salt / LastPass / OTPW / Single sign-on

The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

DocID: 1lbkU - View Document

Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

DocID: 1aQ6c - View Document

Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

DocID: 1ahh2 - View Document