-
1
-
-
77951522096
-
-
last viewed on 10 april 2008
-
What is a sign-in seal? http://security.yahoo.com/article.html?aid= 2006102507 last viewed on 10 april 2008.
-
What Is a Sign-in Seal?
-
-
-
2
-
-
0001230437
-
Random graph isomorphism
-
L. Babai, P. Erdos, and S. M. Selkow. Random graph isomorphism. SIAM Journal on Computing, 9(3):628-635, 1980.
-
(1980)
SIAM Journal on Computing
, vol.9
, Issue.3
, pp. 628-635
-
-
Babai, L.1
Erdos, P.2
Selkow, S.M.3
-
3
-
-
33745778843
-
Deciding security of protocols against off-line guessing attacks
-
New York, NY, USA, ACM
-
M. Baudet. Deciding security of protocols against off-line guessing attacks. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 16-25, New York, NY, USA, 2005. ACM.
-
(2005)
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 16-25
-
-
Baudet, M.1
-
5
-
-
0033686899
-
Quality is in the eye of the beholder: Meeting users' requirements for internet quality of service
-
New York, NY, USA, ACM Press
-
A. Bouch, A. Kuchinsky, and N. Bhatti. Quality is in the eye of the beholder: meeting users' requirements for internet quality of service. In CHI '00: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 297-304, New York, NY, USA, 2000. ACM Press.
-
(2000)
CHI '00: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 297-304
-
-
Bouch, A.1
Kuchinsky, A.2
Bhatti, N.3
-
6
-
-
0014701097
-
An efficient algorithm for graph isomorphism
-
D. G. Corneil and C. C. Gotlieb. An efficient algorithm for graph isomorphism. J. ACM, 17(1):51-64, 1970.
-
(1970)
J. ACM
, vol.17
, Issue.1
, pp. 51-64
-
-
Corneil, D.G.1
Gotlieb, C.C.2
-
7
-
-
77951606052
-
A polynomial time algorithm for graph isomorphism
-
abs/0711.2010
-
R. Czerwinski. A polynomial time algorithm for graph isomorphism. CoRR, abs/0711.2010, 2007.
-
(2007)
CoRR
-
-
Czerwinski, R.1
-
8
-
-
35348884906
-
A large-scale study of web password habits
-
New York, NY, USA, ACM Press
-
D. Florencio and C. Herley. A large-scale study of web password habits. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 657-666, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
10
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
New York, NY, USA, ACM Press
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In STOC '85: Proceedings of the seventeenth annual ACM symposium on Theory of computing, pages 291-304, New York, NY, USA, 1985. ACM Press.
-
(1985)
STOC '85: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
11
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648-656, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
12
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. P. Jablon. Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev., 26(5):5-26, 1996.
-
(1996)
SIGCOMM Comput. Commun. Rev.
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
14
-
-
84944878354
-
-
CRC Press, Inc., Boca Raton, FL, USA
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
15
-
-
0014380830
-
Response time in man-computer conversational transactions
-
San Francisco, Calif
-
R. B. Miller. Response time in man-computer conversational transactions. In Proc. AFIPS Fall Joint Computer Conference Vol. 33, pages 267-277, San Francisco, Calif, 1968.
-
(1968)
Proc. AFIPS Fall Joint Computer Conference
, vol.33
, pp. 267-277
-
-
Miller, R.B.1
-
16
-
-
85015402934
-
Use of elliptic curves in cryptography
-
New York, NY, USA, Springer-Verlag New York, Inc.
-
V. S. Miller. Use of elliptic curves in cryptography. In Lecture notes in computer sciences; 218 on Advances in cryptology - CRYPTO 85, pages 417- 426, New York, NY, USA, 1986. Springer-Verlag New York, Inc.
-
(1986)
Lecture Notes in Computer Sciences; 218 on Advances in Cryptology - CRYPTO 85
, pp. 417-426
-
-
Miller, V.S.1
-
17
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
New York, NY, USA, ACM
-
A. Narayanan and V. Shmatikov. Fast dictionary attacks on passwords using time-space tradeoff. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 364-372, New York, NY, USA, 2005. ACM.
-
(2005)
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
18
-
-
0038687701
-
Securing passwords against dictionary attacks
-
New York, NY, USA, ACM
-
B. Pinkas and T. Sander. Securing passwords against dictionary attacks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 161-170, New York, NY, USA, 2002. ACM.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
21
-
-
33846283646
-
Hardening web browsers against man-in-the-middle and eavesdropping attacks
-
New York, NY, USA, ACM Press
-
H. Xia and J. C. Brustoloni. Hardening web browsers against man-in-the-middle and eavesdropping attacks. In WWW '05: Proceedings of the 14th international conference on World Wide Web, pages 489-498, New York, NY, USA, 2005. ACM Press.
-
(2005)
WWW '05: Proceedings of the 14th International Conference on World Wide Web
, pp. 489-498
-
-
Xia, H.1
Brustoloni, J.C.2
|