Date: 2015-04-16 15:07:31Password Key management Crypt John the Ripper Key derivation function Brute-force attack Passwd Botnet OTPW Cryptography Computer security Security | | Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mcAdd to Reading ListSource URL: nsrc.cse.psu.eduDownload Document from Source Website File Size: 263,70 KBShare Document on Facebook
|