Passwd

Results: 95



#Item
11Computer access control / Computer security / Cryptography / Identity management / Cybercrime / Password / Salt / Passwd / One-time password / Password policy / Random password generator / Multi-factor authentication

contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:29:05
12Identity management / Password / Security / User / Passwd / Password policy

I-Suite 2013 Training - Student Manual UNIT 1 I-Suite Introduction

Add to Reading List

Source URL: isuite.nwcg.gov

Language: English - Date: 2013-05-08 16:34:21
13Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43
14Cryptography / Computer access control / Cryptographic protocols / Password-authenticated key agreement / Password / Passwd / Encrypted key exchange / Crypt / Password Authenticated Key Exchange by Juggling

Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:50:59
15Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

Add to Reading List

Source URL: www.findravi.com

Language: English - Date: 2009-04-03 23:54:54
16Password / Security / Cryptography / Unix / Passwd / Monosodium glutamate / Crypt / Guessing / Name Service Switch

How to prevent type-flaw guessing attacks on password protocols Sreekanth Malladi and Jim Alves-Foss University of Idaho, USA. June 22, 2003

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
17

Steps for DSpace Installation in any Linux Flavors / Version 32 bit or 64 bit operating system Step1 : Login as Linux Root user and create a dspace user with password as dspace123 command #useradd -m dspace #passwd dspac

Add to Reading List

Source URL: www.library.iitkgp.ernet.in

Language: English
    18Cryptography / Key management / Scrypt / Key derivation function / Password cracking / PBKDF2 / Password / Bcrypt / Brute-force attack / Crypt / Passwd / Key

    scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2009-06-11 07:30:54
    19Computer security / Cyberwarfare / Cryptography / Security / Password / Key management / Cross-site request forgery / Crypt / Passwd / SQL injection / Cross-site scripting / Code injection

    Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

    Add to Reading List

    Source URL: ilia.ws

    Language: English - Date: 2015-09-26 04:23:31
    20Passwd / Technical communication / JavaScript / Specification / Software / System software / Computing

    Protocols, communication format, and PHP script specification for Palm/PHProjekt synchronization software Revision: 1.9 Date: :34:46

    Add to Reading List

    Source URL: www.baker-research.com

    Language: English - Date: 2014-04-28 13:25:59
    UPDATE