-
1
-
-
0003693664
-
-
Wadsworth & Brooks/Cole, Pacific Grove, CA
-
Becker, R. A., J. M. Chambers, A. R. Wilks [1988]. The New S Language: A Programming Environment for Data Analysis and Graphics, Wadsworth & Brooks/Cole, Pacific Grove, CA.
-
(1988)
The New S Language: A Programming Environment for Data Analysis and Graphics
-
-
Becker, R.A.1
Chambers, J.M.2
Wilks, A.R.3
-
3
-
-
0029238493
-
Improving system security via proactive password checking
-
1995
-
Bishop, M. and D. V. Klein [1995]. "Improving system security via proactive password checking," Computers and Security 14, 3, 1995, pp. 233-249.
-
(1995)
Computers and Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
6
-
-
0034140877
-
Protecting secret keys with personal entropy
-
February 2000
-
Ellison, C., C. Hall, R. Milbert and B. Schneier [2000]. "Protecting secret keys with personal entropy," Future Generation Computer Systems 16, 4, February 2000, pp. 311-318.
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
8
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
Knuth, D. E. [1973]. The Art of Computer Programming, Volume 3: Sorting and Searching, Addison-Wesley, Reading, MA.
-
(1973)
The Art of Computer Programming, Volume 3: Sorting and Searching
, vol.3
-
-
Knuth, D.E.1
-
10
-
-
0018543411
-
Password security: A case history
-
Nov. 1979
-
Morris, R. and K. Thompson [1979]. "Password security: A case history," Comm. ACM 22,.11, Nov. 1979, pp. 594-597.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
11
-
-
25144458725
-
Call center customer verification by query-directed passwords
-
Florida, 9-12 Feb. 2004
-
O'Gorman, L., A. Bagga, and J. Bentley [2004]. "Call center customer verification by query-directed passwords," 8th Int. Financial Cryptography Conference, Florida, 9-12 Feb. 2004.
-
(2004)
8th Int. Financial Cryptography Conference
-
-
O'Gorman, L.1
Bagga, A.2
Bentley, J.3
-
12
-
-
84856043672
-
A mathematical theory of communication
-
July, October, 1948
-
Shannon, C. E. [1948]. "A mathematical theory of communication," Bell System Tech. J. 27, July, October, 1948, pp.379-423,623-656, http://cm.bell-labs.com/cm/ms/what/shannonday/paper.html.
-
(1948)
Bell System Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
13
-
-
84890522850
-
Communication theory of secrecy systems
-
October 1949
-
Shannon, C. E. [1949]. "Communication theory of secrecy systems," Bell System Tech. J. 28, October 1949, pp. 656-715.
-
(1949)
Bell System Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
16
-
-
0008915230
-
The memorability and security of passwords - Some empirical results
-
University of Cambridge, Computer Laboratory, September 2000
-
Yan, J., A. Blackwell, R. Anderson, and A. Grant [2000]. "The memorability and security of passwords - some empirical results," TR 500, University of Cambridge, Computer Laboratory, September 2000, http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-500.pdf
-
(2000)
TR
, vol.500
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|