Author of the publication

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.

, , , , , , , , and . IEEE Symposium on Security and Privacy, page 523-537. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Password Policies for Strength and Usability., , , , , , , , , and . ACM Trans. Inf. Syst. Secur., 18 (4): 13:1-13:34 (2016)Rate allocation and buffer management for differentiated services., and . Computer Networks, 40 (1): 89-110 (2002)Marking algorithms for service differentiation of TCP traffic., and . Computer Communications, 28 (18): 2058-2069 (2005)Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade., , and . USENIX Security Symposium, USENIX Association, (2011)Audit Games with Multiple Defender Resources., , , , and . CoRR, (2014)Near Rationality and Competitive Equilibria in Networked Systems, , and . CoRR, (2004)Moving Forward, Building an Ethics Community (Panel Statements)., , , and . Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, page 178-183. Springer, (2011)On the Cost of Participating in a Peer-to-Peer Network., and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 22-32. Springer, (2004)JoBS: Joint Buffer Management and Scheduling for Differentiated Services., and . IWQoS, volume 2092 of Lecture Notes in Computer Science, page 404-418. Springer, (2001)Design and Evaluation of a Data-Driven Password Meter., , , , , , , , , and 2 other author(s). CHI, page 3775-3786. ACM, (2017)