-
1
-
-
3242814357
-
-
NDSS'03, San Diego, February
-
M. Abadi, M. Burrows, M. Manasse, T. Wobber, "Moderately Hard, Memory-bound Functions", NDSS'03, San Diego, February 2003.
-
(2003)
Moderately Hard, Memory-bound Functions
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
5
-
-
0038482881
-
-
web site, first appeared
-
CAPTCHA Project web site, http://www.captcha.net/ (first appeared: 2000).
-
(2000)
CAPTCHA Project
-
-
-
7
-
-
1542593353
-
Authentication and Authenticated Key Exchange
-
W. Diffie, P.C. van Oorschot, M.J. Wiener, "Authentication and Authenticated Key Exchange", Designs, Codes and Cryptography vol.2 (1992), 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
84943235829
-
Pricing via Processing or Combatting Junk Mail
-
Proceedings of CRYPTO'92
-
C. Dwork, M. Naor, "Pricing via Processing or Combatting Junk Mail", Lecture Notes in Computer Science 740 (Proceedings of CRYPTO'92), 1993, pp. 137-147.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 137-147
-
-
Dwork, C.1
Naor, M.2
-
9
-
-
0041847762
-
-
Federal Information Processing Standards Publication 112, U.S. Department of Commerce, NIST
-
Password Usage, Federal Information Processing Standards Publication 112, U.S. Department of Commerce, NIST, 1985.
-
(1985)
Password Usage
-
-
-
10
-
-
33750922440
-
-
FIPS Pub 112, U.S. Dept. Commerce
-
Automated Password Generator, FIPS Pub 112, U.S. Dept. Commerce, 1993.
-
(1993)
Automated Password Generator
-
-
-
12
-
-
0025545832
-
Verifiable-text attacks in cryptographic protocols
-
L. Gong, "Verifiable-text attacks in cryptographic protocols", 1990 IEEE INFOCOM, pp.686-693.
-
1990 IEEE INFOCOM
, pp. 686-693
-
-
Gong, L.1
-
13
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, T. Lomas, R. Needham, J. Saltzer, "Protecting poorly chosen secrets from guessing attacks", IEEE J. Selected Areas Comm. vol.11 (1993), pp.648-656.
-
(1993)
IEEE J. Selected Areas Comm.
, vol.11
, pp. 648-656
-
-
Gong, L.1
Lomas, T.2
Needham, R.3
Saltzer, J.4
-
14
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Oct.
-
D. Jablon, "Strong password-only authenticated key exchange", ACM Computer Communcations Review, Oct.1996.
-
(1996)
ACM Computer Communcations Review
-
-
Jablon, D.1
-
16
-
-
0004216472
-
-
Prentice Hall
-
C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, Second Edition, Prentice Hall, 2002.
-
(2002)
Network Security: Private Communication in A Public World, Second Edition
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
17
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
presented ACM Symp. on Operating Systems Principles
-
T. Lomas, L. Gong, J. Saltzer, R. Needham, "Reducing risks from poorly chosen keys", Operating Systems Review vol.13, pp.14-18 (presented at 1989 ACM Symp. on Operating Systems Principles).
-
(1989)
Operating Systems Review
, vol.13
, pp. 14-18
-
-
Lomas, T.1
Gong, L.2
Saltzer, J.3
Needham, R.4
-
22
-
-
35248831179
-
CAPTCHA: Using Hard AI Problems for Security
-
Springer-Verlag, LNCS
-
L. von Ahn, M. Blum, N. Hopper, J. Langford, "CAPTCHA: Using Hard AI Problems for Security", Eurocrypt'03 proceedings, Springer-Verlag, LNCS 2656 (2003).
-
(2003)
Eurocrypt'03 Proceedings
, pp. 2656
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
26
-
-
0008915230
-
The Memorability and Security of Passwords - Some Empirical Results
-
Computer Lab, Cambridge
-
J. Yan, A. Blackwell, R. Anderson, A. Grant, "The Memorability and Security of Passwords - Some Empirical Results", Tech. Report 500, Computer Lab, Cambridge, 2000. http://www.ftp.cl.cam.ac.uk/ftp/rja14/tr500.pdf.
-
(2000)
Tech. Report
, vol.500
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|