Passphrase

Results: 268



#Item
161Password / Passphrase / Dictionary attack / Password manager / OTPW / Cryptography / Security / Computer security

Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2014-06-20 07:50:36
162Passphrase / Security / Public key certificate / Computer security / Cyberwarfare / Cryptography / Key management / Password

Regulatory, General Information & Guidelines

Add to Reading List

Source URL: www.landonline.govt.nz

Language: English - Date: 2014-04-15 07:07:33
163Computer security / Randomness / Password / Diceware / Dictionary attack / Cryptography / Security / Passphrase

Correct horse battery staple: Exploring the usability of system-assigned passphrases Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorri

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 09:00:27
164System software / Security / Spyware / Computer virus / Passphrase / Computer security / Password / Keystroke logging / Outpost Security Suite / Espionage / Computer network security / Antivirus software

Regulatory, General Information & Guidelines

Add to Reading List

Source URL: www.landonline.govt.nz

Language: English - Date: 2014-04-15 07:07:33
165Access control / Password / Passphrase / Password cracking / Password manager / Security / Cryptography / Computer security

Password Policy 1. Purpose: The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change of the passwords. 2. Scope: The scope of

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2013-11-26 23:29:39
166System software / Password / Passphrase / Crypt / ROT13 / Computer security / Forensic Toolkit / Cryptography

Applied Decryption Distributed Network Attack / Forensic Toolkit / FTK Imager / Password Recovery Toolkit Advanced • One-Day Instructor-Led Course

Add to Reading List

Source URL: ad-pdf.s3.amazonaws.com

Language: English - Date: 2014-07-11 18:25:47
167Taxation in the United States / E-Verify / Passphrase / Security / Ethics / Privacy / Social Security / Social Security number

Compli9--FAQ’s  Does the email entered to initiate an I-9 for an employee need to be a university email? o No, you may use any email address the employee provides

Add to Reading List

Source URL: www.indiana.edu

Language: English - Date: 2014-03-28 08:22:22
168Taxation in the United States / E-Verify / Passphrase / Security / Ethics / Privacy / Social Security / Social Security number

Compli9--FAQ’s  Does the email entered to initiate an I-9 for an employee need to be a university email? o No, you may use any email address the employee provides

Add to Reading List

Source URL: hr.iu.edu

Language: English - Date: 2014-03-28 08:22:22
169Passphrase / Password / Email / Computing / Internet / Computer icon / Pictograms / Windows Explorer

EPA Functional Design Document Template

Add to Reading List

Source URL: epa.gov

Language: English - Date: 2014-08-26 07:41:54
170Cryptography / Password / Two-factor authentication / Passphrase / Password policy / Privileged password management / Security / Access control / Computer security

OUCH! | May[removed]IN THIS ISSUE.. • Strong Passwords: Passphrases • Using Passwords Securely • Resources

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-05-06 12:07:06
UPDATE