Sciweavers

175 search results - page 1 / 35
» Password policy simulation and analysis
Sort
View
DIM
2007
ACM
14 years 2 months ago
Password policy simulation and analysis
Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Be...
SOUPS
2010
ACM
14 years 2 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
INFOCOM
2010
IEEE
13 years 9 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
AUSFORENSICS
2004
13 years 12 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
WSC
2001
13 years 12 months ago
Simulation and analysis of dealers' returns distribution strategy
Due to high demand uncertainty, excess inventory has been a key issue in inventory control. Caterpillar developed the dealers' parts inventory sharing (DPIS) and returns prog...
Hui Zhao