Search

Your search keyword '"Rainbow table"' showing total 64 results

Search Constraints

Start Over You searched for: Descriptor "Rainbow table" Remove constraint Descriptor: "Rainbow table" Publisher ieee Remove constraint Publisher: ieee
64 results on '"Rainbow table"'

Search Results

1. Fast Decryption of Excel Document Encrypted by RC4 Algorithm

2. An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt

3. New Approach in the Rainbow Tables Method for Human-Like Passwords

4. Implementation of high speed rainbow table generation using Keccak hashing algorithm on GPU

5. Cryptanalysis on the Head and Tail Technique for Hashing Passwords

6. Modern Network Security Practices: Using Rainbow Tables to Solve Organizational Issues

7. Pristine PixCaptcha as Graphical Password for Secure eBanking Using Gaussian Elimination and Cleaves Algorithm

8. Analysis on the Security and Use of Password Managers

9. The Fuzzy Scheduling Algorithm for the Parallel Key Searching Problem on Cloud Environment

10. Optimized Password Recovery for SHA-512 on GPUs

11. SPHINX: A Password Store that Perfectly Hides Passwords from Itself

12. Statistical Optimal Hash-Based Longest Prefix Match

13. DePass: A secure hash-based authentication scheme

14. A collision-mitigation hashing scheme utilizing empty slots of cuckoo hash table

15. Enhanced password processing scheme based on visual cryptography and OCR

16. Deterministic and Efficient Hash Table Lookup Using Discriminated Vectors

17. Decryption of Frequent Password Hashes in Rainbow Tables

18. A Method for Cracking the Password of WPA2-PSK Based on SA and HMM

19. STUMP - STalling offline password attacks Using pre-hash ManiPulations

20. Improved GPU Implementation of RainbowCrack

21. Dynamic Salt Generating Scheme Using Seeds Warehouse Table Coordinates

22. Differential Power Analysis on Dynamic Password Token Based on SM3 Algorithm, and Countermeasures

23. Enhanced Virtual Password Authentication Scheme Resistant to Shoulder Surfing

24. An Overview of Study of Passowrd Cracking

25. A Blocked Rainbow Table Time-Memory Trade-Off Method

26. A review towards enhancing authentication scheme using Image Fusion and multishared Cryptography

27. An efficient implementation of PBKDF2 with RIPEMD-160 on multiple FPGAs

28. High-speed implementation of bcrypt password search using special-purpose hardware

29. Rainbow table TMTO attack optimization considering online sequential search time

30. Security analysis of mobile QQ

31. HMAC based one tıme password generator

32. Enhace the security of password by fuzzy controller

33. Access LUT without CAM - Improved Pearson hashing for collision reduction

34. Usage of botnets for high speed MD5 hash cracking

35. SAFE: Shoulder-surfing attack filibustered with ease

36. Rainbow table to crack password using MD5 hashing algorithm

37. A Scheme for the Generation of Strong ICMetrics Based Session Key Pairs for Secure Embedded System Applications

38. Resilience against brute force and rainbow table attacks using strong ICMetrics session key pairs

39. Security Analysis of salt||password Hashes

40. A parctical approach to secure WLANs for SOHO and enterprises

41. Evaluating Cryptanalytical Strength of Lightweight Cipher PRESENT on Reconfigurable Hardware

42. A General Way to Break Hash-based Challenge-and-Response

43. SQLIMW: A New Mechanism against SQL-injection

44. LightFlow: Speeding up GPU-based flow switching and facilitating maintenance of flow table

45. A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network

46. A universal distributed model for password cracking

47. Password based authentication: Philosophical survey

48. Enabling Use of Single Password over Multiple Servers in Two-Server Model

49. The Design and Implementation of Password Authentication System Based on Chaos

50. A hash-based scalable IP lookup using Bloom and fingerprint filters

Catalog

Books, media, physical & digital resources