Dictionary attack

Results: 46



#Item
11Computer security / Cyberwarfare / Dictionary attack / OTPW / Password manager / Security / Password / Cryptography

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-01 10:05:10
12Password / Passphrase / Salt / Dictionary attack / Crack / Password manager / Password cracking / Cryptography / Security / Computer security

Rethinking Password Policies A B E S I N G E R A N D WA R R E N A N D E R S O N Abe Singer is the Chief Security Officer for the Laser Inter­ ferometer Gravitational Wave

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-08-01 15:40:11
13Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
14Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
15Password / Passphrase / Dictionary attack / Password manager / OTPW / Cryptography / Security / Computer security

Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-05-02 13:23:25
16Password / Randomness / John the Ripper / Entropy / Dictionary attack / OTPW / Random password generator / Cryptography / Security / Computer security

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Rich Shay, Tim Vidas Lujo Bauer, Nicolas Christin, Lo

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:39:30
17Computer security / Randomness / Password / Diceware / Dictionary attack / Cryptography / Security / Passphrase

Correct horse battery staple: Exploring the usability of system-assigned passphrases Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorri

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:39:40
18Cryptography / Password / Dictionary attack / Single sign-on / Password manager / Privileged password management / Security / Computer security / Access control

Published in International Journal of Information Security; Volume 8, Number 4; August 2009 The original publication is available at www.springerlink.com; DOI[removed]s10207[removed]Richard Shay · Elisa Bertino A Co

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
19Password / Security Accounts Manager / Crypt / Dictionary attack / L0phtCrack / Password strength / Password manager / Computer security / Cryptography / Security

Password Guidelines Nigel Pentland February 2001 Introduction The objective of this paper is to give some simple, easy to use guidelines on choosing

Add to Reading List

Source URL: www.nigelpentland.co.uk

Language: English - Date: 2005-02-12 16:21:00
20Cryptographic hash functions / Salt / Rainbow table / Password cracking / Password / Dictionary attack / NTLM / Crack / MD5 / Cryptography / Computer security / Cyberwarfare

Enough with the Insanity Dictionary Based Rainbow Tables Matt Weir Florida State University Shmoocon 2009

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:40
UPDATE