Password strength

Results: 809



#Item
21Alternative Keyboard Layouts for Improved Password Entry and Creation on Mobile Devices Ethan Genco, Ryan Kelley, Cody Vernon and Adam J. Aviv { m152490, m153678, m156960, aviv}@usna.edu  United States Naval Academy

Alternative Keyboard Layouts for Improved Password Entry and Creation on Mobile Devices Ethan Genco, Ryan Kelley, Cody Vernon and Adam J. Aviv { m152490, m153678, m156960, aviv}@usna.edu United States Naval Academy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:23
22Comparisons of Data Collection Methods for Android Graphical Pattern Unlock Adam J. Aviv Jeanne Luning Prak

Comparisons of Data Collection Methods for Android Graphical Pattern Unlock Adam J. Aviv Jeanne Luning Prak

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:44
23Recall-A-Story, a story-telling story graphical password system Yves Maetz  Stéphane Onno

Recall-A-Story, a story-telling story graphical password system Yves Maetz Stéphane Onno

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-12 08:49:34
24Volume: 2 Issue: 10 www.villagesgenealogy.org June 15, 2010 _________________________________________________________________________________________________  John DeAngelo, Editor

Volume: 2 Issue: 10 www.villagesgenealogy.org June 15, 2010 _________________________________________________________________________________________________ John DeAngelo, Editor

Add to Reading List

Source URL: www.villagesgenealogy.org

Language: English - Date: 2014-04-17 11:14:45
25Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
26ARE YOU CYBER SAVVY? RESEARCH SUMMARY September, 2015  Contents

ARE YOU CYBER SAVVY? RESEARCH SUMMARY September, 2015 Contents

Add to Reading List

Source URL: press.kaspersky.com

Language: English - Date: 2015-10-30 16:24:05
27Guided instructions for eL-Users of EAC, on how to activate their eL-User Accounts by using their ‘pre-assigned eL-Login Name’ in the EAC eLearning System: How to start the EAC e-Learning System: •  Open ‘Mozilla

Guided instructions for eL-Users of EAC, on how to activate their eL-User Accounts by using their ‘pre-assigned eL-Login Name’ in the EAC eLearning System: How to start the EAC e-Learning System: • Open ‘Mozilla

Add to Reading List

Source URL: www.eac.edu.ph

Language: English - Date: 2015-06-30 07:19:00
28Microsoft Word - soups2009-poster-abstract-template.doc

Microsoft Word - soups2009-poster-abstract-template.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-15 07:10:07
29Exploring Secure Identity Management in Global Enterprises  Exploring Secure Identity Management in Global Enterprises A Joint Study by Novell Worldwide Services, Stanford University and

Exploring Secure Identity Management in Global Enterprises Exploring Secure Identity Management in Global Enterprises A Joint Study by Novell Worldwide Services, Stanford University and

Add to Reading List

Source URL: www.ssystems.de

Language: English - Date: 2012-03-23 22:25:43
30Digital Citizenship Learning Outcomes YearsYears 1 and 2 § § §

Digital Citizenship Learning Outcomes YearsYears 1 and 2 § § §

Add to Reading List

Source URL: swaygrantham.co.uk

Language: English - Date: 2014-07-02 18:52:20