27:47 David Jaeger Analysis of Publicly Leaked Credentials and the Long Story of Password Re use All Hacking Cons
26:13 Peter Mayer Enabling Automatic Password Change in Password Managers Through Crowdsourcing All Hacking Cons
39:25 Manuel Urueña User Experience of Current Auth Mechanisms and a Proposal for Future Ones All Hacking Cons
20:27 Simon Woo Improving Recall and Security of Passphrases Through Use of Mnemonics All Hacking Cons
21:10 Adrian Dabrowski Mobile Phone's Wi Fi Presence for Continuous Implicit Secondary Deauth All Hacking Cons