From post

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.

, , , , , , , , и . IEEE Symposium on Security and Privacy, стр. 523-537. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Visualizing Request-Flow Comparison to Aid Performance Diagnosis in Distributed Systems., , , и . IEEE Trans. Vis. Comput. Graph., 19 (12): 2466-2475 (2013)Build It, Break It, Fix It: Contesting Secure Development., , , , , , , и . CoRR, (2019)A Tag-Based, Logical Access-Control Framework for Personal File Sharing.. Carnegie Mellon University, USA, (2014)Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes., , , , , и . login Usenix Mag., (2020)Equitable Security: Optimizing Distribution of Nudges and Resources., , , и . ACM Conference on Computer and Communications Security, стр. 2270-2272. ACM, (2018)How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior., , и . ACM Conference on Computer and Communications Security, стр. 666-677. ACM, (2016)How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples., , и . IEEE Symposium on Security and Privacy, стр. 1326-1343. IEEE, (2019)The Effectiveness of Security Images in Internet Banking., , и . IEEE Internet Comput., 19 (1): 54-62 (2015)Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers., , , , , , , , , и . CSET @ USENIX Security Symposium, USENIX Association, (2017)An Observational Investigation of Reverse Engineers' Processes., , , , и . USENIX Security Symposium, стр. 1875-1892. USENIX Association, (2020)