Passphrase

Results: 268



#Item
21Liberty, Security, Identity A response to the Government’s Consultation Document1 David Llewellyn-Jones  http://www.flypig.co.uk/ 7th October 2002

Liberty, Security, Identity A response to the Government’s Consultation Document1 David Llewellyn-Jones http://www.flypig.co.uk/ 7th October 2002

Add to Reading List

Source URL: www.flypig.co.uk

Language: English - Date: 2015-04-13 15:49:11
22How to Memorize a Random 60-Bit String Marjan Ghazvininejad Information Sciences Institute Department of Computer Science University of Southern California

How to Memorize a Random 60-Bit String Marjan Ghazvininejad Information Sciences Institute Department of Computer Science University of Southern California

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2015-03-22 17:56:07
23PIRATEMAIL TUTORIAL This tutorial will discuss the ECU E-mail (Piratemail), the PirateID and the Passphrase. The PirateID, passphrase and how to access the Piratemail Email is explained first. To proceed directly to the

PIRATEMAIL TUTORIAL This tutorial will discuss the ECU E-mail (Piratemail), the PirateID and the Passphrase. The PirateID, passphrase and how to access the Piratemail Email is explained first. To proceed directly to the

Add to Reading List

Source URL: www.ecu.edu

Language: English - Date: 2012-06-19 09:06:22
24SET AND USE STRONG PASSWORDS Passwords and PINs are used to identify who you are. Sometimes they are the only defense to protect your information against unauthorized access. If your password or PIN is captured, guessed

SET AND USE STRONG PASSWORDS Passwords and PINs are used to identify who you are. Sometimes they are the only defense to protect your information against unauthorized access. If your password or PIN is captured, guessed

Add to Reading List

Source URL: www.am-win.com.au

Language: English - Date: 2015-03-30 01:32:32
25

PDF Document

Add to Reading List

Source URL: www.ecu.edu

Language: English - Date: 2014-08-29 10:58:33
26

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
27Exploring the Usability of Pronounceable Passwords Shing-hon Lau, Stephen Siena, Ashutosh Pandey, Sroaj Sosothikul, Lorrie Cranor, Blase Ur, Richard Shay Carnegie Mellon University Pittsburgh, PA, USA {shinghol, ssiena,

Exploring the Usability of Pronounceable Passwords Shing-hon Lau, Stephen Siena, Ashutosh Pandey, Sroaj Sosothikul, Lorrie Cranor, Blase Ur, Richard Shay Carnegie Mellon University Pittsburgh, PA, USA {shinghol, ssiena,

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
28Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2014-11-13 13:11:04
29NinjaStik First time use instructions Welcome to your new NinjaStik – online anonymity made easy. Getting started: Turn off your computer, plug the NinjaStik into a USB port, turn on your computer. You will need to tel

NinjaStik First time use instructions Welcome to your new NinjaStik – online anonymity made easy. Getting started: Turn off your computer, plug the NinjaStik into a USB port, turn on your computer. You will need to tel

Add to Reading List

Source URL: www.ninjastik.com

Language: English - Date: 2013-08-06 14:51:07
30OUCH! | April, 2015  IN THIS ISSUE... •	 Passphrases •	 Using Passphrases Securely •	 Resources

OUCH! | April, 2015 IN THIS ISSUE... • Passphrases • Using Passphrases Securely • Resources

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-03-31 16:53:29