Sciweavers

920 search results - page 15 / 184
» Selecting Secure Passwords
Sort
View
CCS
1998
ACM
15 years 4 months ago
Public-Key Cryptography and Password Protocols
Shai Halevi, Hugo Krawczyk
SOICT
2010
14 years 6 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
COMCOM
2008
82views more  COMCOM 2008»
14 years 11 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...