Dictionary attack

Results: 46



#Item
1Solution to ensure TPM resistance to offline dictionary attack Liqun Chen HP Labs, Bristol  Mark D. Ryan

Solution to ensure TPM resistance to offline dictionary attack Liqun Chen HP Labs, Bristol Mark D. Ryan

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2010-03-26 11:08:41
    2Solution to ensure TPM resistance to offline dictionary attack Liqun Chen HP Labs, Bristol  Mark D. Ryan

    Solution to ensure TPM resistance to offline dictionary attack Liqun Chen HP Labs, Bristol Mark D. Ryan

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2010-03-26 11:08:41
      3On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

      On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

      Add to Reading List

      Source URL: vialab.science.uoit.ca

      Language: English - Date: 2015-09-22 16:31:59
      4A New Attack on Random Pronounceable Password Generators  Ganesan and Davies A New Attack on Random Pronounceable Password Generators

      A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

      Add to Reading List

      Source URL: www.findravi.com

      Language: English - Date: 2009-04-03 23:54:54
      5Solution to ensure TPM resistance to offline dictionary attack Liqun Chen HP Labs, Bristol  Mark D. Ryan

      Solution to ensure TPM resistance to offline dictionary attack Liqun Chen HP Labs, Bristol Mark D. Ryan

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2010-03-26 11:08:41
        6Flowchart dictionary attack

        Flowchart dictionary attack

        Add to Reading List

        Source URL: www.emsec.rub.de

        Language: English - Date: 2014-03-18 14:56:56
          7Lecture 24: The Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems Lecture Notes on “Computer and Network Security” by Avi Kak () April 27, 2015

          Lecture 24: The Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems Lecture Notes on “Computer and Network Security” by Avi Kak () April 27, 2015

          Add to Reading List

          Source URL: engineering.purdue.edu

          Language: English - Date: 2015-04-27 11:09:36
          8Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

          Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

          Add to Reading List

          Source URL: www.umiacs.umd.edu

          Language: English - Date: 2014-11-13 13:11:04
          9From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

          From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

          Add to Reading List

          Source URL: madiba.encs.concordia.ca

          Language: English - Date: 2013-12-07 13:46:37