<--- Back to Details
First PageDocument Content
Cryptography / Computer access control / Computer security / Password / Salt / Challengeresponse authentication / Crypt / Brute-force attack / Key derivation function / Passphrase / OTPW
Date: 2017-12-30 21:51:59
Cryptography
Computer access control
Computer security
Password
Salt
Challengeresponse authentication
Crypt
Brute-force attack
Key derivation function
Passphrase
OTPW

The TypTop System: Personalized Typo-Tolerant Password Checking

Add to Reading List

Source URL: acmccs.github.io

Download Document from Source Website

File Size: 1,20 MB

Share Document on Facebook

Similar Documents

Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

DocID: 1r4Lp - View Document

Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qRqP - View Document

Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

DNSSEC Key Maintenance Analysis_final

DocID: 1qEU7 - View Document

Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

DocID: 1pG6u - View Document

Computing / Concurrent computing / Parallel computing / GPGPU / Computer architecture / Video cards / Graphics hardware / Cryptography / Key derivation function / Scrypt / Brute-force attack / Password cracking

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ยด

DocID: 1nnoz - View Document