-
1
-
-
0038234347
-
Zipf, power-laws, and pareto-A ranking tutorial
-
L. A. Adamic. Zipf, power-laws, and pareto-a ranking tutorial. Xerox Palo Alto Research Center, http://www.hpl.hp.com/research/idl/papers/ranking/ ranking.html, 2000.
-
(2000)
Xerox Palo Alto Research Center
-
-
Adamic, L.A.1
-
2
-
-
0029732887
-
An inequality on guessing and its application to sequential decoding
-
Janurary
-
E. Arikan. An inequality on guessing and its application to sequential decoding. IEEE Transactions on Information Theory, 42, Janurary 1996.
-
(1996)
IEEE Transactions on Information Theory
, vol.42
-
-
Arikan, E.1
-
3
-
-
65549085067
-
Power-law distributions in empirical data
-
A. Clauset, C. Shalizi, and M. Newman. Power-law distributions in empirical data. SIAM review, 51(4):661-703, 2009.
-
(2009)
SIAM Review
, vol.51
, Issue.4
, pp. 661-703
-
-
Clauset, A.1
Shalizi, C.2
Newman, M.3
-
6
-
-
77956890234
-
Monte carlo sampling methods using markov chains and their applications
-
W. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1):97, 1970.
-
(1970)
Biometrika
, vol.57
, Issue.1
, pp. 97
-
-
Hastings, W.1
-
7
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
ACM
-
C. Herley. So long, and no thanks for the externalities: the rational rejection of security advice by users. In Proceedings of the 2009 workshop on New security paradigms, pages 133-144. ACM, 2009.
-
(2009)
Proceedings of the 2009 Workshop on New Security Paradigms
, pp. 133-144
-
-
Herley, C.1
-
12
-
-
5744249209
-
Equation of state calculations by fast computing machines
-
N. Metropolis, A. Rosenbluth, M. Rosenbluth, A. Teller, and E. Teller. Equation of state calculations by fast computing machines. The journal of chemical physics, 21(6):1087, 1953.
-
(1953)
The Journal of Chemical Physics
, vol.21
, Issue.6
, pp. 1087
-
-
Metropolis, N.1
Rosenbluth, A.2
Rosenbluth, M.3
Teller, A.4
Teller, E.5
-
13
-
-
24844450736
-
The disparity between work and entropy in cryptology
-
J. O. Pliam. The disparity between work and entropy in cryptology. Theory of Cryptography Library: Record, pages 98-24, 1998.
-
(1998)
Theory of Cryptography Library: Record
, pp. 24-98
-
-
Pliam, J.O.1
-
14
-
-
0029714667
-
Unified login with pluggable authentication modules (PAM)
-
V. Samar. Unified login with pluggable authentication modules (PAM). In Proc. CCS'96, pages 1-10, 1996.
-
(1996)
Proc. CCS'96
, pp. 1-10
-
-
Samar, V.1
-
15
-
-
85071080463
-
Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
-
S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec'10, pages 1-6, 2010.
-
(2010)
Proc. HotSec'10
, pp. 1-6
-
-
Schechter, S.1
Herley, C.2
Mitzenmacher, M.3
|