-
1
-
-
34547315136
-
-
v-GO SSPR 5.0 product description. Referenced 2006 at www.passlogix.com.
-
v-GO SSPR 5.0 product description. Referenced 2006 at www.passlogix.com.
-
-
-
-
4
-
-
84957800809
-
The KeyNote trust management system
-
Security Protocols International Workshop, Springer-Verlag
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. The KeyNote trust management system. In Security Protocols International Workshop, pages 59-63. Springer-Verlag, 1998. LNCS no. 1550.
-
(1998)
LNCS
, Issue.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
5
-
-
84958048748
-
Compliance-checking in the PolicyMaker trust-management system
-
Financial Cryptography, Springer-Verlag
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance-checking in the PolicyMaker trust-management system. In Financial Cryptography, pages 251-265. Springer-Verlag, 1998. LNCS no. 1465.
-
(1998)
LNCS
, Issue.1465
, pp. 251-265
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
6
-
-
34547269636
-
-
W. Eazel. 'Live phishing experiment nets consumers hook, line, and sinker. SC Magazine, 8 November 2005. Referenced 2006 at www.scmagazine.com.
-
W. Eazel. 'Live phishing experiment nets consumers hook, line, and sinker. SC Magazine, 8 November 2005. Referenced 2006 at www.scmagazine.com.
-
-
-
-
9
-
-
26444473661
-
Messin' with Texas: Deriving mothers maiden names using public records
-
J. Ioannidis, A. D. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security ACNS, Springer-Verlag
-
V. Griffith and M. Jakobsson. Messin' with Texas: Deriving mothers maiden names using public records. In J. Ioannidis, A. D. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security (ACNS), pages 91-103. Springer-Verlag, 2005. LNCS no. 3531.
-
(2005)
LNCS
, Issue.3531
, pp. 91-103
-
-
Griffith, V.1
Jakobsson, M.2
-
10
-
-
34547317891
-
Product Specification
-
RSA Security Inc. RSA SecurID authenticators, at
-
RSA Security Inc. RSA SecurID authenticators, 2006. Product Specification. Referenced 2006 at www.rsasecurity.com.
-
(2006)
Referenced 2006
-
-
-
11
-
-
34547318786
-
-
J. Jubak. Globalization isn't what's killing GM. MSN Money, 29 November 2005. Referenced 2006 at moneycentral.msn.com.
-
J. Jubak. Globalization isn't what's killing GM. MSN Money, 29 November 2005. Referenced 2006 at moneycentral.msn.com.
-
-
-
-
12
-
-
34547325935
-
-
D. V. Klein. Foiling the cracker: A survey of and improvements to, password security. In UNIX Security II: USENIX Workshop Proceedings, pages 5-14, Berkeley, CA, 1990.
-
D. V. Klein. Foiling the cracker: A survey of and improvements to, password security. In UNIX Security II: USENIX Workshop Proceedings, pages 5-14, Berkeley, CA, 1990.
-
-
-
-
13
-
-
34547364475
-
-
J. Leyden. Office workers give away passwords for a cheap pen. The Register, 18 April 2003. Referenced 2006 at www.theregister.co.uk.
-
J. Leyden. Office workers give away passwords for a cheap pen. The Register, 18 April 2003. Referenced 2006 at www.theregister.co.uk.
-
-
-
-
16
-
-
34547346646
-
-
T. Pullar-Strecker. NZ bank adds security online. Sidney Morning Herald, 8 November 2004. Referenced 2006 at www.smh.com.au.
-
T. Pullar-Strecker. NZ bank adds security online. Sidney Morning Herald, 8 November 2004. Referenced 2006 at www.smh.com.au.
-
-
-
-
17
-
-
84863469085
-
Stronger password authentication using browser extensions. In P. McDaniel, editor
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In P. McDaniel, editor, USENIX Security, pages 17-32, 2005.
-
(2005)
USENIX Security
, pp. 17-32
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
|