22:44 password generators extended character set passwords stephen lombardo william gray All Hacking Cons
30:20 highlights of cmus recent work in preventing bad passwords sean segreti blase ur All Hacking Cons
25:09 capturing passwords into the secure desktop marcio almeida de macedo bruno gonçalves de oliveira All Hacking Cons
28:49 tradeoff cryptanalysis of password hashing schemes dmitry khovratovich alex biryukov johann grobscha All Hacking Cons
27:16 how eff is making starttls resistant to active attacks jacob hoffman andrews yan zhu All Hacking Cons
37:42 enhancing password based key derivation techniques stephen lombardo nick parker All Hacking Cons
57:03 what microsoft would like from the password hashing competition marsh ray greg zaverucha All Hacking Cons
32:49 proof of work as an additional factor of authentication phillippe paquet jason nehrboss All Hacking Cons
56:00 security for the people end user authentication security on the internet mark stanislav All Hacking Cons