Crypt

Results: 686



#Item
41Cryptography / Password / Security / Cryptographic hash functions / Challengeresponse authentication / Crypt / Password cracking / Password policy

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
42Mausoleum / Garden / Shrine of Remembrance

Mausoleum Crypt Options at Michigan Memorial Park Mausoleum - Above Ground Options

Add to Reading List

Source URL: www.mimemorial.com

Language: English - Date: 2016-03-18 07:37:16
43Cryptography / Password / Java applet / Dropbox / Applet / Crypt / Expect / Key derivation function / Password manager / Password policy

Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich Northeastern University CC&IS

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 14:44:50
44Cryptography / Computer access control / Password / Security / Salt / Crypt / Challengeresponse authentication / Security token / Password synchronization / Password fatigue

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-08-12 08:57:24
45

ICS423: Data Security and Cryptography I Synopsis History of secret communication and confidential data storage. Elements of cryptography and cryptanalysis. Classical ciphers. Symmetric key cryptography. Public key crypt

Add to Reading List

Source URL: www.asecolab.org

- Date: 2015-08-25 22:40:59
    46Scrypt / Key management / Cryptography / PBKDF2 / Key derivation function / Password / Cache / Crypt

    Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    47Password / Security / Cryptography / Draw a Secret / Salt / Crypt / Password manager / Password strength

    Recall-A-Story, a story-telling story graphical password system Yves Maetz Stéphane Onno

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2009-06-12 08:49:34
    48The Crucible / Ed Hale

    CHAPTER 1 The silent city around Lieutenant Ken Hale felt like an empty crypt. After the alien Xaros wiped the planet clean of all human life and nearly scoured away the last traces of civilization, the city of Tucson, A

    Add to Reading List

    Source URL: richardfoxauthor.com

    Language: English - Date: 2015-11-30 14:37:04
    49Identity management / Password / Security / Social networking services / Computer access control / Twitter / Social media / Crypt / Challengeresponse authentication / Password policy / Password strength

    Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-21 12:56:54
    50Block ciphers / Cryptography / Free software / Serpent / Data Encryption Standard / Python / Cipher / Crypt / Advanced Encryption Standard / Reference implementation / Python syntax and semantics

    Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory Serpent is a 128-bit block cipher designed by Ross

    Add to Reading List

    Source URL: legacy.python.org

    Language: English - Date: 2006-05-04 17:09:08
    UPDATE