11![Usability and Security of Gaze-Based Graphical Grid Passwords Majid Arianezhad1 , Douglas Stebila2 , and Behzad Mozaffari2 1 2 Usability and Security of Gaze-Based Graphical Grid Passwords Majid Arianezhad1 , Douglas Stebila2 , and Behzad Mozaffari2 1 2](https://www.pdfsearch.io/img/2a380c88426fdc2be53bd0030fa82bb1.jpg) | Add to Reading ListSource URL: www.kisc.meiji.ac.jpLanguage: English - Date: 2013-03-20 04:29:54
|
---|
12![Computing / Sudo / Su / OTPW / Environment variable / Command-line interface / Privilege / Secure Shell / Umask / System software / Software / System administration Computing / Sudo / Su / OTPW / Environment variable / Command-line interface / Privilege / Secure Shell / Umask / System software / Software / System administration](/pdf-icon.png) | Add to Reading ListSource URL: www.sudo.wsLanguage: English - Date: 2014-01-06 13:00:43
|
---|
13![How to Memorize a Random 60-Bit String Marjan Ghazvininejad Information Sciences Institute Department of Computer Science University of Southern California How to Memorize a Random 60-Bit String Marjan Ghazvininejad Information Sciences Institute Department of Computer Science University of Southern California](https://www.pdfsearch.io/img/93b68b5d7ff49f3cbbc8452e2e2b5a49.jpg) | Add to Reading ListSource URL: www.isi.eduLanguage: English - Date: 2015-03-22 17:56:07
|
---|
14![Secure4Access (GUARDIAN) A Technical White Paper
NOTICE As Secure4Access is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information Secure4Access (GUARDIAN) A Technical White Paper
NOTICE As Secure4Access is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information](https://www.pdfsearch.io/img/dcb6dd319ee3796cb5ce0646f4c1bd85.jpg) | Add to Reading ListSource URL: www.s4software.comLanguage: English - Date: 2005-01-25 07:00:55
|
---|
15![AN OVERVIEW OF ONLINE POKER SECURITY Luigi Auriemma1 and Donato Ferrante2 ReVuln http://revuln.com AN OVERVIEW OF ONLINE POKER SECURITY Luigi Auriemma1 and Donato Ferrante2 ReVuln http://revuln.com](https://www.pdfsearch.io/img/65480f52e6e99332d66b03732691900e.jpg) | Add to Reading ListSource URL: revuln.comLanguage: English - Date: 2013-04-11 18:41:21
|
---|
16![Microsoft Word - Online Access_First Time Login Guide_071210.doc Microsoft Word - Online Access_First Time Login Guide_071210.doc](https://www.pdfsearch.io/img/503dcb8d8f7856f04200b218d4a752ec.jpg) | Add to Reading ListSource URL: www.onceonline.com.auLanguage: English - Date: 2011-09-19 01:42:14
|
---|
17![Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a](https://www.pdfsearch.io/img/6a817964180aa6dc18c199d56f1a9336.jpg) | Add to Reading ListSource URL: users.ece.cmu.eduLanguage: English - Date: 2011-05-15 21:51:24
|
---|
18![Free
wifi
Hvide
Sande
og
Søndervig
–
users
guide 1. Find the open WI-FI network free-wifi-tourist on your phone, tablet or computer (or scan QR-code with your phone)
Free
wifi
Hvide
Sande
og
Søndervig
–
users
guide 1. Find the open WI-FI network free-wifi-tourist on your phone, tablet or computer (or scan QR-code with your phone)](https://www.pdfsearch.io/img/fb484056843e6527c1e82ee6ad2c4a23.jpg) | Add to Reading ListSource URL: www.sondervig.dkLanguage: English - Date: 2013-07-23 16:15:09
|
---|
19![Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne](https://www.pdfsearch.io/img/ddfbf38e8c521943a2f51bde122a6a36.jpg) | Add to Reading ListSource URL: www.umiacs.umd.eduLanguage: English - Date: 2014-11-13 13:11:04
|
---|
20![Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www. Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www.](https://www.pdfsearch.io/img/eaa472933745b879050909896418bf30.jpg) | Add to Reading ListSource URL: www.usenix.orgLanguage: English - Date: 2015-05-09 05:51:53
|
---|