Cracking

Results: 1107



#Item
71Computer access control / CAPTCHA / Computer security / Computer vision / Password / Spyware / Challengeresponse authentication / Transaction authentication number / Password strength / Password cracking

Microsoft Word - soups2009-poster-abstract-template.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-15 07:10:07
72Webmail / Password / Security / Gmail / Outlook.com / Password cracking / Password manager

    CORE  ACCOUNTS  TECHNOLOGY   TRANSITION  CHECKLIST  

Add to Reading List

Source URL: www.clubs.uci.edu

Language: English - Date: 2016-03-30 09:55:54
73Corrosion prevention / Corrosion / Cathodic protection / Stress corrosion cracking / Stainless steel / Passivation / Fouling / Magnesium alloy / Corrosion fatigue / Nitinol biocompatibility

NRL BAA Announcement #CORROSION PROCESSES, CONTROL, MITIGATION, AND TECHNOLOGY The Naval Research Laboratory (NRL) is interested in receiving proposals for research and development in materials performance, envi

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:52
74Pavements / Road surface / Pavement / Pavement engineering / Crocodile cracking

Comparison of Pavement Distresses Monitored by LTPP and State Agencies The Long-Term Pavement Performance (LTPP) program has collected pavement distresses for sites throughout the country. These sites were used in the in

Add to Reading List

Source URL: cies.mst.edu

Language: English - Date: 2015-07-09 14:19:43
75Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
76

Système de chiffrement pour GSM : A5 family Cracking via GPU Hackito Ergo SumGloire, Gwendal

Add to Reading List

Source URL: 2010.hackitoergosum.org

Language: French - Date: 2010-04-16 11:09:34
    77Cryptography / Computer network security / Wireless networking / Local area networks / Cryptographic protocols / IEEE 802.11 / Wi-Fi Protected Access / Wireless security / GlobalSign / Root certificate / Cracking of wireless networks

    Connecting to the Rovernet WPA2 Secured Wireless Network with UbuntuHardy Heron) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    78Cryptography / Key management / Cryptographic software / Bcrypt / Scrypt / Crypt / Key stretching / Password cracking / Key derivation function / Blowfish / Block cipher / Password

    battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:34:12
    79Computing / Concurrent computing / Parallel computing / GPGPU / Computer architecture / Video cards / Graphics hardware / Cryptography / Key derivation function / Scrypt / Brute-force attack / Password cracking

    Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

    Add to Reading List

    Source URL: lyra2.net

    Language: English - Date: 2014-01-07 11:26:38
    80Cryptography / Key management / Cryptographic hash functions / Key derivation function / PBKDF2 / Password cracking / Password / Key stretching / Salt / Scrypt / Crypt / Key

    The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2015-09-29 12:17:24
    UPDATE