Login / Signup

"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks.

David AspinallMike Just
Published in: Financial Cryptography (2013)
Keyphrases
  • countermeasures
  • information security
  • malicious attacks
  • traffic analysis
  • security mechanisms
  • security protocols
  • network security
  • watermarking algorithm
  • ddos attacks
  • java card
  • security threats
  • malicious users