๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[Lecture Notes in Computer Science] Information Security Technology for Applications Volume 7161 || The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor

โœ Scribed by Laud, Peeter


Book ID
120829357
Publisher
Springer Berlin Heidelberg
Year
2012
Tongue
English
Weight
447 KB
Edition
1
Category
Article
ISBN
3642296157

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.


๐Ÿ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Info
โœ Liu, Baoxiang; Ma, Maode; Chang, Jincai ๐Ÿ“‚ Article ๐Ÿ“… 2012 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ English โš– 262 KB

This book constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications, ICICA 2012, held in Chengde, China, in September 2012. The 100 revised full papers were carefully reviewed and selected from 1089 submissions. The papers are organized in t

[Lecture Notes of the Institute for Comp
โœ Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan ๐Ÿ“‚ Article ๐Ÿ“… 2012 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ English โš– 270 KB

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andse

[Lecture Notes in Computer Science] Info
โœ Mambo, Masahiro; Zheng, Yuliang ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 406 KB

This Book Constitutes The Refereed Proceedings Of The Second International Information Security Workshop, Isw'99, Held In Kuala Lumpur, Malaysia In November 1999. The 23 Revised Full Papers Presented Were Carefully Reviewed And Selected From 38 Submissions. The Book Is Divided In Topical Sections On

[Lecture Notes of the Institute for Comp
โœ Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan ๐Ÿ“‚ Article ๐Ÿ“… 2012 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ English โš– 260 KB

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andse

[Lecture Notes in Computer Science] Info