![Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue](https://www.pdfsearch.io/img/671a07d3e2d1cd97440016b80ad2b79f.jpg) Date: 2010-12-21 12:01:07Computer access control Cryptography Computer security Identity management Password Security One-time password Challengeresponse authentication Crypt Key derivation function Password strength Password fatigue | | Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1Add to Reading ListSource URL: www.eecg.toronto.eduDownload Document from Source Website File Size: 309,84 KBShare Document on Facebook
|