Back to Results
First PageMeta Content
Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security


Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc
Add to Reading List

Document Date: 2015-04-16 15:07:31


Open Document

File Size: 263,70 KB

Share Result on Facebook

City

Introduction Password / /

Company

AES / AMD / Intel / /

/

Facility

Penn State University / National Institute of Standards and Technology / The Pennsylvania State University / SANS Institute / /

Holiday

New Year's Day / /

IndustryTerm

personal computing systems / contemporary computing systems / presented password systems / software-based password recovery techniques / overall computing power / computational devices / password recovery software / trusted authentication systems / raw computing power / password systems / large networks / personal computing system / commodity hardware / password authentication systems / large collaborative / computing / password recovery tools / encryption algorithm / password recovery tool / /

Movie

Happy New Year / /

OperatingSystem

Unix / Linux / /

Organization

National Institute of Standards and Technology / The Pennsylvania State University / SANS Institute / Computer Science and Engineering Department / U.S. Securities and Exchange Commission / Penn State University / /

Person

Matthew Pirretti / Lisa Johansen / William Enck / Moore / Patrick Traynor / Patrick McDaniel / Trent Jaeger / /

/

Position

model of computing / /

Technology

Linux / Unix / 250 processors / 2.1.2 Predicting Processor / DES-based encryption algorithm / /

SocialTag