Showing 1 - 20 results of 34 for search '"password cracking"', query time: 1.75s Refine Results
  1. 1
    by Crumpacker, John R.
    Published 2012
    ...Approved for public release, distribution unlimited === Password cracking requires significant...
    Get full text
  2. 2
    by Bulland, Vishal Vedprakash
    Published 2011
    Subjects: ...Password cracking...
    Get fulltext
    Others
  3. 3
    by Juels, Ari, Rivest, Ronald L.
    Published 2014
    Get fulltext
    Article
  4. 4
    ..., 2011. === Password Checking, Password Strength, Password Cracking === Includes bibliographical...
    Get full text
    Others
  5. 5
    by CHIANG,YU-PING, 江宇平
    Published 2016
    ... passwords cracking system used only one computing processing to crack passwords. The algo-rithms...
    Get full text
    Others
  6. 6
    ...At its heart, a password cracking attack is just a guessing attack. An attacker makes guesses about...
    Get full text
    Others
  7. 7
    by Cha-Shung Chung, 張家祥
    Published 2012
    ... to do Knowledge set and one of them for Testing set. In 1/10000000, the success rate of password...
    Get full text
    Others
  8. 8
    by HSIAO, CHUN-YU, 蕭俊宇
    Published 2016
    ... Spark-based distributed password-cracking system (SDCS). By Spark’s distributed computing architecture...
    Get full text
    Others
  9. 9
  10. 10
    by Himawan Pramaditya
    Published 2017-02-01
    Subjects: ...gpu, password cracking, brute force, security...
    Get full text
    Article
  11. 11
    ... grammar technique has been shown to be very effective in password cracking. In this approach, the system...
    Get full text
    Others
  12. 12
  13. 13
  14. 14
    by Ruixin Shi, Yongbin Zhou, Yong Li, Weili Han
    Published 2021-01-01
    .... In this paper, we present the large-scale empirical study on password-cracking methods proposed by the academic...
    Get full text
    Article
  15. 15
  16. 16
  17. 17
    by Lundberg, Tobias
    Published 2019
    Subjects: ...password cracking...
    Get full text
    Others
  18. 18
    by He-Jun Lu, Yang Yu
    Published 2021-01-01
    ..., password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration...
    Get full text
    Article
  19. 19
    by Rodrigues, Bernardo Araujo
    Published 2018
    ... patterns derived from sample sets to perform password cracking. Distinct statistical distributions...
    Get full text
    Others
  20. 20
    by CHEN YU-FANG, 陳鈺方
    Published 2018
    ... Denial-of-Service Attacks(DDoS), Man-in-the-middle attack (MITM), password cracking and cryptography key...
    Get full text
    Others