-
1
-
-
85025832623
-
-
AMD 3-year technology outlook
-
AMD 3-year technology outlook. http://www.amdcompare.com/techoutlook/.
-
-
-
-
2
-
-
85025810098
-
-
EFF DES cracker project
-
EFF DES cracker project. www.eff.org/Privacy/Crypto/Crypto misc/DESCracker/.
-
-
-
-
3
-
-
85025823811
-
-
John the ripper password cracker
-
John the ripper password cracker. http://www.openwall.com/john/.
-
-
-
-
4
-
-
85025828362
-
-
Number of words in the English language
-
Number of words in the English language. http://hypertextbook.com/facts/2001/JohnnyLing.shtml.
-
-
-
-
5
-
-
85025831124
-
-
pwgen CVS changelog
-
pwgen CVS changelog. http://pwgen.cvs.sourceforge.net/pwgen/src/ChangeLog?revision= 1.8&view=markup.
-
-
-
-
6
-
-
85025838642
-
-
pwgen password generator
-
pwgen password generator. http://sourceforge.net/projects/pwgen/.
-
-
-
-
7
-
-
85025839566
-
-
Sans institute
-
Sans institute. http://www.sans.org/aboutsans.php.
-
-
-
-
8
-
-
85025841814
-
-
SANS password policies
-
SANS password policies. http://www.sans.org/resources/policies/.
-
-
-
-
9
-
-
85025826001
-
-
Unix cyrpt man page
-
Unix cyrpt man page. http://bama.ua.edu/cgi-bin/man-cgi?crypt unix+5.
-
-
-
-
12
-
-
0000874415
-
Limitations of the kerberos authentication system
-
S. M. Bellovin and M. Merritt. Limitations of the kerberos authentication system. SIGCOMM Comput. Commun. Rev., 20(5):119–132, 1990.
-
(1990)
SIGCOMM Comput. Commun. Rev.
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
13
-
-
84947914301
-
A fast new DES implementation in software
-
Eli Biham. A fast new DES implementation in software. Lecture Notes in Computer Science, 1267:260–272, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1267
, pp. 260-272
-
-
Biham, E.1
-
14
-
-
33748848240
-
-
Technical report, Intel
-
Shekhar Y Borkar, Pardeep Dubey, Kevin C Kahn, David J Kuck, Hans Mulder, Stephen S Pawlowski, Justing R Rattner, R M Ramanathan, and Vince Thomas. Platform 2015: Intel Processor and Platform Evolution for the Next Decade. Technical report, Intel, 2005.
-
(2005)
Platform 2015: Intel Processor and Platform Evolution for the Next Decade
-
-
Borkar, S.Y.1
Dubey, P.2
Kahn, K.C.3
Kuck, D.J.4
Mulder, H.5
Pawlowski, S.S.6
Rattner, J.R.7
Ramanathan, R.M.8
Thomas, V.9
-
15
-
-
85025802542
-
-
Federal Fiancial Institutions Examination Council. Authentication in an internet banking environment
-
Federal Fiancial Institutions Examination Council. Authentication in an internet banking environment. http://federalreserve.gov/boarddocs/srletters/2005/SR0519a1.pdf.
-
-
-
-
17
-
-
85025811195
-
-
Manek Dubash. Moore’s Law is dead, says Gordon Moore
-
Manek Dubash. Moore’s Law is dead, says Gordon Moore. http://www.techworld.com/opsys/news/index.cfm?NewsID=3477, 2005.
-
-
-
-
18
-
-
33947581048
-
An in-depth look at computer performance growth
-
Magnus Ekman, Fredrik Warg, and Jim Nilsson. An in-depth look at computer performance growth. SIGARCH Comput. Archit. News, 33(1):144–147, 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.1
, pp. 144-147
-
-
Ekman, M.1
Warg, F.2
Nilsson, J.3
-
20
-
-
34547168664
-
From Moore’s Law to Intel Innovation - Prediction to Reality
-
April
-
Radhakrishna Hiremane. From Moore’s Law to Intel Innovation - Prediction to Reality. Technology@Intel Magazine, April 2005.
-
(2005)
Technology@Intel Magazine
-
-
Hiremane, R.1
-
21
-
-
85084161999
-
The Design and Analysis of Graphic Passwords
-
Ian Jermyn, Alain Mayer, Fabian Monrose, Michael Reiter, and Aviel Rubin. The Design and Analysis of Graphic Passwords. In Proceedings of the 8th Annual USENIX Security Symposium, 1999.
-
(1999)
Proceedings of the 8Th Annual USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
22
-
-
0040231044
-
Klein. “foiling the cracker” – A survey of, and improvements to, password security
-
Summer
-
Daniel V. Klein. “foiling the cracker” – A survey of, and improvements to, password security. In Proceedings of the second USENIX Workshop on Security, pages 5–14, Summer 1990.
-
(1990)
Proceedings of the Second USENIX Workshop on Security
, pp. 5-14
-
-
Daniel, V.1
-
26
-
-
0018543411
-
Password security: A case history
-
Robert Morris and Ken Thompson. Password security: a case history. Commun. ACM, 22(11):594–597, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
27
-
-
33745788833
-
Fast dictionary attacks on passwords using timespace tradeoff
-
New York, NY, USA, ACM Press
-
Arvind Narayanan and Vitaly Shmatikov. Fast dictionary attacks on passwords using timespace tradeoff. In CCS ’05: Proceedings of the 12th ACM conference on Computer and communications security, pages 364–372, New York, NY, USA, 2005. ACM Press.
-
(2005)
CCS ’05: Proceedings of the 12Th ACM Conference on Computer and Communications Security
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
29
-
-
85025811725
-
-
Arnold G. Reinhold. Results of a survey on pgp pass phrase usage
-
Arnold G. Reinhold. Results of a survey on pgp pass phrase usage. http://www.ecst. csuchico.edu/atman/Crypto/misc/pgp-passphrase-survey.html.
-
-
-
|