[KSIĄŻKA][B] Understanding Bitcoin: Cryptography, engineering and economics
P Franco - 2014 - books.google.com
Discover Bitcoin, the cryptocurrency that has the finance world buzzing Bitcoin is arguably
one of the biggest developments in finance since the advent of fiat currency. With …
one of the biggest developments in finance since the advent of fiat currency. With …
" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …
documented features that lead to easily guessed passwords, but have not probed why users …
[KSIĄŻKA][B] Computer security: principles and practice
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …
programmers, system managers, network managers, product marketing personnel, system …
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
only share a password to establish a shared key in a way that is immune to offline attacks …
only share a password to establish a shared key in a way that is immune to offline attacks …
Do users' perceptions of password security match reality?
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …
passwords are predictable is not well understood. We investigate the relationship between …
Why do developers get password storage wrong? A qualitative usability study
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …
usability issues. For end-users, many of these issues have been studied extensively …
House of Graphs 2.0: A database of interesting graphs and more
K Coolsaet, S D'hondt, J Goedgebeur - Discrete Applied Mathematics, 2023 - Elsevier
In 2012 we announced “the House of Graphs”(https://houseofgraphs. org)(Brinkmann et al.
2013), which was a new database of graphs. The House of Graphs hosts complete lists of …
2013), which was a new database of graphs. The House of Graphs hosts complete lists of …
On bitcoin as a public randomness source
We formalize the use of Bitcoin as a source of publicly-verifiable randomness. As a side-
effect of Bitcoin's proof-of-work-based consensus system, random values are broadcast …
effect of Bitcoin's proof-of-work-based consensus system, random values are broadcast …
Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability
Parameterized password guessability—how many guesses a particular cracking algorithm
with particular training data would take to guess a password—has become a common metric …
with particular training data would take to guess a password—has become a common metric …
An {Administrator's} Guide to Internet Password Research
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …
securing web-facing services or setting policies. With a view to improving this situation we …