-
1
-
-
84865820629
-
EMV Integrated Circuit Card Standard for Payment Systems version 4.2
-
EMV Integrated Circuit Card Standard for Payment Systems version 4.2. EMVco (2008)
-
(2008)
EMVco
-
-
-
2
-
-
84865819535
-
-
Technical report, VISA November
-
Issuer PIN Security Guidelines. Technical report, VISA (November 2010)
-
(2010)
Issuer PIN Security Guidelines
-
-
-
6
-
-
77955315492
-
What's in a Name? Evaluating Statistical Attacks against Personal Knowledge Questions
-
Sion, R. (ed.) FC 2010. Springer, Heidelberg
-
Bonneau, J., Just, M., Matthews, G.: What's in a Name? Evaluating Statistical Attacks against Personal Knowledge Questions. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 98-113. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 98-113
-
-
Bonneau, J.1
Just, M.2
Matthews, G.3
-
7
-
-
77955315457
-
-
Technical Report 6, Department of Mathematics, Royal Melbourne Institute of Technology
-
Boztas, S.: Entropies, Guessing, and Cryptography. Technical Report 6, Department of Mathematics, Royal Melbourne Institute of Technology (1999)
-
(1999)
Entropies, Guessing, and Cryptography
-
-
Boztas, S.1
-
10
-
-
70350416988
-
Optimised to Fail: Card Readers for Online Banking
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Drimer, S., Murdoch, S.J., Anderson, R.: Optimised to Fail: Card Readers for Online Banking. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 184-200. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 184-200
-
-
Drimer, S.1
Murdoch, S.J.2
Anderson, R.3
-
12
-
-
84865829539
-
Improvements in or relating to Customer-Operated Dispensing Systems
-
UK Patent #GB1197183
-
Ivan, A., Goodfellow, J.: Improvements in or relating to Customer-Operated Dispensing Systems. UK Patent #GB1197183 (1966)
-
(1966)
-
-
Ivan, A.1
Goodfellow, J.2
-
15
-
-
0018543411
-
Password security: A case history
-
Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594-597 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
16
-
-
77955217681
-
Chip and PIN is Broken
-
Murdoch, S.J., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is Broken. In: IEEE Symposium on Security and Privacy, pp. 433-446 (2010)
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 433-446
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
17
-
-
84947756322
-
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
-
Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. Springer, Heidelberg
-
Pliam, J.O.: On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 67-79. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
, pp. 67-79
-
-
Pliam, J.O.1
-
18
-
-
35348928239
-
Password Sharing: Implications for Security Design Based on Social Practice
-
ACM, New York
-
Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., Furlong, M.: Password Sharing: Implications for Security Design Based on Social Practice. In: CHI 2007: Proceedings of the SIGCHI Conference on Human factors in Computing Systems, pp. 895-904. ACM, New York (2007)
-
(2007)
CHI 2007: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 895-904
-
-
Singh, S.1
Cabraal, A.2
Demosthenous, C.3
Astbrink, G.4
Furlong, M.5
-
20
-
-
39149106769
-
On Predictive Models and User-Drawn Graphical Passwords
-
van Oorschot, P.C., Thorpe, J.: On Predictive Models and User-Drawn Graphical Passwords. ACM Trans. Inf. Syst. Secur. 10(4), 1-33 (2008)
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.4
, pp. 1-33
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
21
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
ACM, New York
-
Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 162-175. ACM, New York (2010)
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
|