Cormac

Results: 158



#Item
81Security / CVSS / Vulnerability / Penetration test / Information security management system / Phishing / Information security / Social engineering / Threat / Computer network security / Computer security / Cyberwarfare

Report from Dagstuhl SeminarSocio-Technical Security Metrics Edited by Dieter Gollmann1 , Cormac Herley2 , Vincent Koenig3 ,

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2015-04-17 07:47:57
82Computer security / Cyberwarfare / Password cracking / Password strength / Password / Cryptography / Security

Telepathwords: preventing weak passwords by reading users’ minds Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart Schechter

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-08-22 17:31:27
83Computer science / Computing / Association for Computing Machinery / Programming Language Design and Implementation / SIGPLAN

                   Practices  of  PLDI Hans  Boehm,  Jack  Davidson,  Kathleen  Fisher,  Cormac  Flanagan,  Jeremy  Gibbons,  Mary  Hall,  Graham Hutton,  David  Padua,  Frank  Tip,  Jan  Vi

Add to Reading List

Source URL: www.sigplan.org

Language: English - Date: 2015-04-12 11:24:20
84Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
85Environmental law / Earth / Sustainable development / Environmental justice / Environmental impact assessment / Centre for Human Rights / Earth Summit / University of Cape Town / Cormac Cullinan / Environment / Environmental protection / Environmental social science

DOC Document

Add to Reading List

Source URL: www.imel.uct.ac.za

Language: English - Date: 2012-10-03 03:27:07
86

Catherine Lépront Cormac McCarthy Elle publie « Esther Mésopotamie », un roman, et « Entre le silence et l’œuvre »,

Add to Reading List

Source URL: www.ddooss.org

Language: French - Date: 2007-01-20 11:11:59
    87

    5 AugustMr Cormac Murphy Adviser, Listings Compliance ASX Limited 20 Bridge Street

    Add to Reading List

    Source URL: www.uel.com.au

    - Date: 2015-03-24 03:54:14
      88Crime prevention / Electronic commerce / National security / Secure communication / Malware / Password / FUD / Public safety / Fear /  uncertainty and doubt / Security / Computer network security / Computer security

      FUD: a plea for intolerance Dinei Florêncio, Cormac Herley and Adam Shostack Microsoft Corp., Redmond, WA Even a casual observer of computer security must notice the prevalence of FUD: non-falsifiable claims that promot

      Add to Reading List

      Source URL: research.microsoft.com

      Language: English - Date: 2014-05-22 14:45:21
      89Data types / List / Cons / Programming language / Lisp / Type system / Pointer / ALGOL 68 / Reference / Software engineering / Computing / Computer programming

      Catching Bugs in the Web of Program Invariants Cormac Flanagan Matthew Flatt Shriram Krishnamurthi

      Add to Reading List

      Source URL: www.seas.upenn.edu

      Language: English - Date: 2014-07-10 05:47:15
      90Sound / Uilleann pipes / Chanter / New Interfaces for Musical Expression / Synthesizer / Gary Scavone / Bore / Pastoral pipes / Music / Bagpipes / Waves

      Proceedings of the 2003 Conference on New Interfaces for Musical Expression (NIME-03), Montreal, Canada EpipE: Exploration of the Uilleann Pipes as a Potential Controller for Computer-based Music Cormac Cannon

      Add to Reading List

      Source URL: www.music.mcgill.ca

      Language: English - Date: 2003-05-20 15:14:24
      UPDATE