1![Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library](https://www.pdfsearch.io/img/c06e84b7d937de0e96d23747629d7e8a.jpg) | Add to Reading ListSource URL: library.ccsu.eduLanguage: English - Date: 2010-07-26 11:08:41
|
---|
2![Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect Tobias Seitz, Emanuel von Zezschwitz, Stefanie Meitner, Heinrich Hussmann Media Informatics Group LMU Munich Email: , em Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect Tobias Seitz, Emanuel von Zezschwitz, Stefanie Meitner, Heinrich Hussmann Media Informatics Group LMU Munich Email: , em](https://www.pdfsearch.io/img/93f8d6de273beaa3cb741fb6512e128e.jpg) | Add to Reading ListSource URL: www.medien.ifi.lmu.deLanguage: English - Date: 2016-07-21 11:36:47
|
---|
3![PWGen for Windows - Generator of cryptographically strong passwords USER MANUAL VersionLicensing Information PWGen for Windows - Generator of cryptographically strong passwords USER MANUAL VersionLicensing Information](https://www.pdfsearch.io/img/ce66c5c5abf23ddaf6b5b4ee815fd9dd.jpg) | Add to Reading ListSource URL: pwgen-win.sourceforge.netLanguage: English - Date: 2016-04-19 17:08:02
|
---|
4![The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract](https://www.pdfsearch.io/img/cbf5d29b4e24c21d012b8d2aab48f640.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2015-04-27 09:52:37
|
---|
5![contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology. contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.](https://www.pdfsearch.io/img/cdb71cf70ec67f5df96dfec478b9be9b.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 2015-07-13 14:29:05
|
---|
6![A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators](https://www.pdfsearch.io/img/a264c61c565fc304f31a46b3cfc1d4aa.jpg) | Add to Reading ListSource URL: www.findravi.comLanguage: English - Date: 2009-04-03 23:54:54
|
---|
7![Probabilistic password generators (and fancy curves) Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall Probabilistic password generators (and fancy curves) Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall](https://www.pdfsearch.io/img/1356cd570cf3fd3e44d1a9d2effad0ce.jpg) | Add to Reading ListSource URL: distro.ibiblio.orgLanguage: English - Date: 2012-12-06 13:03:31
|
---|
8![FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is](https://www.pdfsearch.io/img/b3ef37bda3226740b9ccc133952b5a56.jpg) | Add to Reading ListSource URL: corex.atLanguage: English - Date: 2015-05-13 12:15:06
|
---|
9![FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is](https://www.pdfsearch.io/img/2bdad2f262c172440509ec74528a6d0f.jpg) | Add to Reading ListSource URL: www.corex.atLanguage: English - Date: 2015-05-13 12:15:06
|
---|
10![This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi](https://www.pdfsearch.io/img/c7456935df9839df0f4bf555109fa703.jpg) | Add to Reading ListSource URL: cacr.uwaterloo.caLanguage: English - Date: 2011-07-10 02:35:13
|
---|