Password cracking

Results: 174



#Item
11Comparisons of Data Collection Methods for Android Graphical Pattern Unlock Adam J. Aviv Jeanne Luning Prak

Comparisons of Data Collection Methods for Android Graphical Pattern Unlock Adam J. Aviv Jeanne Luning Prak

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:44
12Microsoft Word - soups2009-poster-abstract-template.doc

Microsoft Word - soups2009-poster-abstract-template.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-15 07:10:07
13   	
   CORE	
  ACCOUNTS	
  TECHNOLOGY	
   TRANSITION	
  CHECKLIST	
  

    CORE  ACCOUNTS  TECHNOLOGY   TRANSITION  CHECKLIST  

Add to Reading List

Source URL: www.clubs.uci.edu

Language: English - Date: 2016-03-30 09:55:54
14Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
15battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:34:12
16Security of Key Derivation Functions Ewerton Rodrigues Andrade  Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Add to Reading List

Source URL: lyra2.net

Language: English - Date: 2014-01-07 11:26:38
17The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-09-29 12:17:24
18How They Do It: Unix Hacking 101 Hal Pomeranz Deer Run Associates  Who Am I?

How They Do It: Unix Hacking 101 Hal Pomeranz Deer Run Associates Who Am I?

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2004-08-16 11:51:23
19Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Saranga Komanduri  Patrick Gage Kelley, Michelle L. Mazurek,

Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Saranga Komanduri Patrick Gage Kelley, Michelle L. Mazurek,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-06-01 23:27:39
    20Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

    Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

    Add to Reading List

    Source URL: www.estv.admin.ch

    Language: English