<--- Back to Details
First PageDocument Content
Cryptography / Computer access control / Obfuscation / Password / Passphrase / Random password generator / Diceware / Key / Password psychology / Password manager
Date: 2016-07-21 11:36:47
Cryptography
Computer access control
Obfuscation
Password
Passphrase
Random password generator
Diceware
Key
Password psychology
Password manager

Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect Tobias Seitz, Emanuel von Zezschwitz, Stefanie Meitner, Heinrich Hussmann Media Informatics Group LMU Munich Email: , em

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Download Document from Source Website

File Size: 272,54 KB

Share Document on Facebook

Similar Documents

Central Connecticut State University  Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

DocID: 1qXF3 - View Document

Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect Tobias Seitz, Emanuel von Zezschwitz, Stefanie Meitner, Heinrich Hussmann Media Informatics Group LMU Munich Email: , em

Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect Tobias Seitz, Emanuel von Zezschwitz, Stefanie Meitner, Heinrich Hussmann Media Informatics Group LMU Munich Email: , em

DocID: 1qS26 - View Document

PWGen for Windows  - Generator of cryptographically strong passwords USER MANUAL VersionLicensing Information

PWGen for Windows - Generator of cryptographically strong passwords USER MANUAL VersionLicensing Information

DocID: 1pS4j - View Document

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015  Abstract

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

DocID: 1nsFe - View Document

contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

DocID: 1nadt - View Document