Sciweavers

175 search results - page 1 / 35
» Password policy simulation and analysis
Sort
View
DIM
2007
ACM
13 years 9 months ago
Password policy simulation and analysis
Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Be...
SOUPS
2010
ACM
13 years 9 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
INFOCOM
2010
IEEE
13 years 3 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
AUSFORENSICS
2004
13 years 6 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
WSC
2001
13 years 6 months ago
Simulation and analysis of dealers' returns distribution strategy
Due to high demand uncertainty, excess inventory has been a key issue in inventory control. Caterpillar developed the dealers' parts inventory sharing (DPIS) and returns prog...
Hui Zhao