Back to Results
First PageMeta Content
Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security


Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit
Add to Reading List

Open Document

File Size: 480,14 KB

Share Result on Facebook

City

Introduction Password / /

Company

AES / AMD / Intel / Trent Jaeger Systems / Internet Infrastructure Security Laboratory / /

/

Facility

Penn State University / Internet Infrastructure Security Laboratory The Pennsylvania State University / The Pennsylvania State University / University Park PA / /

IndustryTerm

large systems / personal computing systems / proper algorithm / contemporary computing systems / presented password systems / overall computing power / computational devices / password recovery software / password cracking tools / trusted authentication systems / modeled computer systems / raw computing power / password systems / large networks / personal computing system / commodity hardware / password authentication systems / large collaborative / computing / password recovery tools / password recovery tool / evaluated systems / /

OperatingSystem

Unix / /

Organization

The Pennsylvania State University / SANS Institute / Computer Science and Engineering Department / U.S. Securities and Exchange Commission / Penn State University / /

Person

Patrick McDaniel / Matthew Pirretti / Lisa Johansen / Patrick Traynor / William Enck / Moore / /

/

Position

model of computing / /

Technology

Unix / DES algorithm / 250 processors / MD5 algorithm / /

SocialTag