<--- Back to Details
First PageDocument Content
Computer security / User / Login / Federated identity / OTPW / Shadow password / Security / Password / Access control
Date: 2005-02-22 16:02:46
Computer security
User
Login
Federated identity
OTPW
Shadow password
Security
Password
Access control

RoboDemo Tuesday, February 22, 2005 Frame ID Item ID Caption 3218 - Adventures in

Add to Reading List

Source URL: www.tc.state.mn.us

Download Document from Source Website

File Size: 71,00 KB

Share Document on Facebook

Similar Documents

Cryptography / Computer access control / Computer security / Password / Security / Draw a Secret / Crypt / Key / Password strength / OTPW

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

DocID: 1qnKy - View Document

Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

DocID: 1lTzP - View Document

Computer access control / Computer security / Access control / Identity management / Cryptographic software / Cryptography / Federated identity / Password / Salt / LastPass / OTPW / Single sign-on

The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

DocID: 1lbkU - View Document

Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

DocID: 1aQ6c - View Document

Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

DocID: 1ahh2 - View Document