<--- Back to Details
First PageDocument Content
Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security
Date: 2015-04-16 15:07:31
Password
Key management
Crypt
John the Ripper
Key derivation function
Brute-force attack
Passwd
Botnet
OTPW
Cryptography
Computer security
Security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

Add to Reading List

Source URL: nsrc.cse.psu.edu

Download Document from Source Website

File Size: 263,70 KB

Share Document on Facebook

Similar Documents

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

DocID: 1qnKy - View Document

A New Attack on Random Pronounceable Password Generators  Ganesan and Davies A New Attack on Random Pronounceable Password Generators

A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

DocID: 1lTzP - View Document

The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

DocID: 1lbkU - View Document

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

DocID: 1aQ6c - View Document

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

DocID: 1ahh2 - View Document