Author of the publication

STUMP - STalling offline password attacks Using pre-hash ManiPulations.

, , and . ICPADS, page 306-313. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Multi-level Composition Optimization Algorithms with Level-Independent Convergence Rates., , and . CoRR, (2020)A functional naturalism.. Synth., 198 (1): 295-313 (2021)Enhancing Bacterial Infection Prediction in Critically Ill Patients by Integrating Clinical Text., and . ALTA, page 118-124. Association for Computational Linguistics, (2023)Deployment of a Multi-site Cloud Environment for Molecular Virtual Screenings., , , , , and . e-Science, page 145-154. IEEE Computer Society, (2015)Stochastic Multilevel Composition Optimization Algorithms with Level-Independent Convergence Rates., , and . SIAM J. Optim., 32 (2): 519-544 (2022)Uncovering Variations in Clinical Notes for NLP Modeling., , , and . MedInfo, volume 310 of Studies in Health Technology and Informatics, page 1460-1461. IOS Press, (2023)Stochastic Zeroth-Order Functional Constrained Optimization: Oracle Complexity and Applications., and . INFORMS J. Optim., 5 (3): 256-272 (July 2023)Automated ICD Coding using Extreme Multi-label Long Text Transformer-based Models., , , , and . CoRR, (2022)Evaluating the usability of a mobile content sharing game., , , , and . SAC, page 597-598. ACM, (2010)Simulating stencil-based application on future Xeon Phi processor., , , , , and . PMBS@SC, page 7:1-7:10. ACM, (2015)