Dictionary attack

Results: 46



#Item
21Password / John the Ripper / Passphrase / Dictionary attack / Key derivation function / Crypt / Crack / Part-of-speech tagging / Password manager / Cryptography / Computer security / Security

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32
22Password / Passphrase / Dictionary attack / Crypt / Crack / Key derivation function / Password policy / Password manager / Cryptography / Computer security / Security

Joint Universities Computer Centre Limited (“JUCC”) Information Security Awareness Training - Session Two End User Security, IS Control Evaluation & Self- Assessment Password Management

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-11-23 20:45:53
23Computer security / Cryptographic software / Password policy / Password cracking / Cryptography / Password / Security

A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS Amir Sadovnik and Tsuhan Chen Department of Electrical and Computer Engineering, Cornell University ABSTRACT Microsoft’s Picture Password provides a method to authenticat

Add to Reading List

Source URL: chenlab.ece.cornell.edu

Language: English - Date: 2013-05-30 11:27:44
24Computing / Password / Microsoft Excel / End-user license agreement / Dictionary attack / Software license / Password manager / Computer law / Software / Law

InFixi Excel Password Recovery Welcome to InFixi Excel Password Recovery Help Guide Excel Password Recovery Program Ver: 1.0

Add to Reading List

Source URL: www.infixi.com

Language: English - Date: 2013-01-28 13:05:14
25Password / John the Ripper / Passphrase / Dictionary attack / Key derivation function / Crypt / Crack / Part-of-speech tagging / Password manager / Cryptography / Computer security / Security

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32
26Computer security / Randomness / Password / Diceware / Dictionary attack / Cryptography / Security / Passphrase

Correct horse battery staple: Exploring the usability of system-assigned passphrases Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorri

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2012-08-09 13:29:33
27Password / Passphrase / Dictionary attack / Password manager / OTPW / Cryptography / Security / Computer security

Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2014-05-30 12:45:27
28Cryptography / Password / Passphrase / One-time password / Two-factor authentication / Cryptographic software / Security token / Crypt / Dictionary attack / Security / Computer security / Access control

Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-02-13 11:02:58
29John Philip Holland / General Dynamics Electric Boat / Submarine / Naval Submarine Base New London / Attack on Pearl Harbor / Edward L. Beach /  Jr. / USS Nautilus / USS Triton / Watercraft / Connecticut / Groton /  Connecticut

What manner of legacy will you leave? In-tes-tate an adjective, meaning according to Webster’s II New Riverside Dictionary, Revised Edition, “not having made a legal will. Or, not disposed of by a will.” Sounds for

Add to Reading List

Source URL: ussnautilus.org

Language: English - Date: 2011-09-06 17:32:10
30Cryptography / Password / Passphrase / One-time password / Two-factor authentication / Cryptographic software / Security token / Crypt / Dictionary attack / Security / Computer security / Access control

Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:04
UPDATE