2024-01-11 | I Love my BFF Brute Force Framework Kirk Hayes | 24:06 | 5 | |
|
2024-01-11 | Opening Keynote Pt I & II Lorrie Cranor FTC, Michael Kaiser NCSA | 36:18 | 0 | |
|
2024-01-11 | PAL is your pal Bootstrapping secrets in Docker Nick Sullivan | 51:00 | 2 | |
|
2024-01-11 | Passphrases for Humans A Cultural Approach to Passphrase Wordlist Generation | 58:57 | 3 | |
|
2024-01-11 | Proactive Password Leak Processing Bruce Marshall | 1:00:43 | 1 | |
|
2024-01-11 | Rock Salt A Method for Securely Storing and Utilizing Password Validation Data | 42:57 | 4 | |
|
2024-01-11 | The Deal with Password Alternatives Terry Gold | 55:14 | 0 | |
|
2024-01-11 | Toward Better Password Requirements Jim Fenton | 56:32 | 1 | |
|
2024-01-11 | What we've learned with Two Secret Key Derivation Jeffrey Goldberg, Julie Haugh | 35:31 | 0 | |
|
2024-01-11 | What's Up Argon2 The Password Hashing Winner A Year Later JP Aumasson | 24:58 | 0 | |
|
2024-01-11 | Disclosing Passwords Hashing Policies Michal Spacek | 33:12 | 0 | |
|
2024-01-11 | Jeffrey Goldberg What does MFA mean | 33:32 | 0 | |
|
2024-01-11 | Kelley Robinson Authentication Beyond SMS | 24:51 | 0 | |
|
2024-01-11 | PasswordsCon Day 1 2023 | 8:28:25 | 4 | |
|
2024-01-11 | Marie Baléo The Big Picture | 31:31 | 0 | |
|
2024-01-11 | Miranda Wei Everything but the User Reducing Password Reuse | 21:09 | 0 | |
|
2024-01-11 | Moritz Horsch The Wide Diversity of Password Requirements And how to cope with it | 26:57 | 0 | Guide |
|
2024-01-11 | Ricky Mondello How iOS Encourages Healthy Password Practices | 38:30 | 1 | |
|
2024-01-11 | Rob Yoder Random Passwords Aren't Good Enough | 28:06 | 1 | |
|
2024-01-11 | Sibusiso Sishi An investigation of the effectiveness and security of pwds | 23:47 | 0 | |
|
2024-01-11 | Suby Raman Web Authentication From Draft To Product | 24:45 | 0 | |
|
2024-01-11 | Vladimir Katalov iCloud Security What if someone gets your password | 30:17 | 0 | |
|
2024-01-11 | Almedin Santic & Camilla Lyngedal Implementing password never expires | 22:30 | 0 | |
|
2024-01-11 | Carl Svensson Protecting medical data with passwordless authentication | 17:08 | 2 | |
|
2024-01-11 | Cecilie Wian Human skills for more secure behaviour | 22:38 | 0 | |
|
2024-01-11 | Christiaan Brand WebAuthn and security keys unlocking the key to authentication | 29:19 | 0 | |
|
2024-01-11 | Hazel Murray Advice is like mushrooms, the wrong kind can prove fatal | 16:29 | 0 | |
|
2024-01-11 | Pilar Garcia Who are you again Verifying user access rights in an encryption based system | 17:58 | 0 | |
|
2024-01-11 | Cecilie Wian Enterprise Password Managers A Review | 30:47 | 0 | Review |
|
2024-01-11 | Dr Matt Weir Practical PCFG Password Cracking | 53:11 | 0 | |
|
2024-01-11 | Maximilian Golla & Blase ur Reasoning Analytically About Password Cracking Software | 27:25 | 1 | |
|
2024-01-11 | Tal Beery & Alex Manuskin 2 Become One, 1 Becomes Two Attacking and Protecting 2FA Tokens | 29:26 | 0 | |
|
2024-01-11 | Anders Lemke Holstein Just authentication for the internet | 22:17 | 1 | |
|
2024-01-11 | David Biesner Advances in Deep Learning for Password Generation | 19:33 | 0 | |
|
2024-01-11 | Dustin EvilMog Heywood Print Spooler to Domain Admin in 30 Minutes or less | 16:36 | 2 | |
|
2024-01-11 | Erlend Andreas Gjære Feeling the Difference Between Human Error and Secure Behavior | 26:50 | 1 | |
|
2024-01-11 | Hazel Murray and David Malone Multi armed bandit approach to password guessing | 19:13 | 0 | |
|
2024-01-11 | Hoyt Kesterson Better Living Through Better Passwords | 24:36 | 0 | |
|
2024-01-11 | Jeff Goldberg A Report on the 1Password Cracking Challenge | 20:27 | 0 | |
|
2024-01-11 | Jim Fenton Is the future really passwordless | 23:12 | 0 | |
|
2024-01-11 | Philipp Markert Everything You Always Wanted to Know About PINs But Were Afraid to Ask | 28:22 | 1 | |
|
2024-01-11 | Pilar Garcia Hello Who is this A journey to stronger verification practices | 17:59 | 0 | |
|
2024-01-11 | Ricky Mondello Password Manager Resources Open Source Project | 13:03 | 2 | |
|
2024-01-11 | Stephan Wiefling On The Usability Of Risk Based Authentication | 24:31 | 0 | |
|
2024-01-11 | How I hacked a bank using pen & paper | 46:50 | 0 | |
|
2024-01-11 | A Journey To Zero Trust | 33:11 | 0 | |
|
2024-01-11 | Password surveys are shit | 25:14 | 0 | |
|
2024-01-11 | Protecting Against Breached Credentials in Identity Workflows | 42:32 | 0 | |
|
2024-01-11 | Secrets of the Second Factor Threat Hunting with Multi Factor Authentication | 47:21 | 0 | |
|
2024-01-11 | The One With The Foreign Wordlist | 42:47 | 0 | |
|
2024-01-11 | Why kidz couldn't care less about your password advice | 51:54 | 0 | |
|
2024-01-11 | Your Passwords Should Be Shorter | 31:22 | 0 | |
|
2024-01-11 | All Things FIDO Panel Q&A | 57:08 | 0 | |
|
2024-01-11 | bscrypt A Cache Hard Password Hash | 28:39 | 0 | |
|
2024-01-11 | Can a password management service safely learn about users' passwords | 44:04 | 0 | |
|
2024-01-11 | Comparing Centrally and Locally Verified Memorized Secrets | 1:56:53 | 0 | |
|
2024-01-11 | Cracking passwords for good, bad & commercial purposes second thoughts on password cracking | 1:03:37 | 0 | |
|
2024-01-11 | I knowBut I Have a System | 43:04 | 0 | |
|
2024-01-11 | Passkeys Where we started and where we're going | 32:05 | 0 | |
|
2024-01-11 | PasswordsCon Day 2 2023 | 6:25:53 | 0 | |
|
2024-01-11 | Ame Elliott Respecting Participants in Privacy Related User Studies | 15:59 | 0 | |
|
2024-01-11 | Linus Gasser Managing Identities Using Blockchains and CoSi | 15:48 | 0 | |
|
2024-01-11 | Andy Rupp Black Box Accumulation Collecting Incentives in a Privacy Preserving Way | 15:24 | 1 | |
|
2024-01-11 | Marina Blanton and Fattaneh Bayatbabolghani Efficient Server Aided Secure Two Party Function | 16:09 | 0 | |
|
2024-01-11 | Angela Sasse Goodbye Passwords, Hello Biometrics Do We Understand the Privacy Implications | 55:27 | 1 | |
|
2024-01-11 | Frederik Möllers & Christoph Sorge Privacy Challenges in the Quantified Self Movement | 15:16 | 1 | |
|
2024-01-11 | Gabor György Gulyás Near Optimal Fingerprinting with Constrain'ts | 14:27 | 0 | |
|
2024-01-11 | Giulia Fanti Building a RAPPOR with the Unknown | 15:52 | 0 | |
|
2024-01-11 | Aylin Caliskan Islam A Story of Discrimination and Unfairness | 15:06 | 0 | |
|
2024-01-11 | Hamza Harkous The Curious Case of the PDF Converter that Likes Mozart | 15:45 | 0 | |
|
2024-01-11 | Carlos Aguilar Melchor XPIR Private Information Retrieval for Everyone | 15:25 | 0 | Guide |
|
2024-01-11 | Hao Wu Location Privacy with Randomness Consistency | 14:05 | 1 | |
|
2024-01-11 | Chad Spensky SoK Privacy on Mobile Devices It’s Complicated | 15:25 | 1 | |
|
2024-01-11 | Harry Halpin The Responsibility of Open Standards in the Era of Surveillance | 17:04 | 0 | |
|
2024-01-11 | Cristina Onete Achieving Better Privacy for the 3GPP AKA Protocol | 16:54 | 0 | |
|
2024-01-11 | Jean Sebastien Legare Beeswax A Platform for Private Web Apps | 15:24 | 1 | |
|
2024-01-11 | Dan Blah Meredith Thank You for Protecting Human Rights HotPETs Keynote 2016 | 41:40 | 0 | |
|
2024-01-11 | Jens Grossklags Towards a Model on the Factors Influencing Social App Users' Valuation | 15:42 | 0 | |
|
2024-01-11 | João Garcia Isolating Graphical Failure Inducing Input | 14:21 | 0 | |
|
2024-01-11 | John M Schanck Circuit Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World | 15:02 | 1 | |
|
2024-01-11 | David J Wu Privately Evaluating Decision Trees and Random Forests | 14:57 | 0 | |
|
2024-01-11 | Kassem Fawaz Privacy vs Reward in Indoor Location Based Services | 14:24 | 0 | |
|
2024-01-11 | Emmanuel Bello Ogunu Crowdsourcing for Context | 14:55 | 0 | |
|
2024-01-11 | Keith Ross The Right to be Forgotten in the Media A Data Driven Study | 20:25 | 0 | |
|
2024-01-11 | Esha Ghosh Efficient Verifiable Range and Closest Point Queries in Zero Knowledge | 13:28 | 0 | |
|
2024-01-11 | Franz Kargl Tales from the Dark Side Privacy Dark Strategies and Privacy Dark Patterns | 14:28 | 0 | |
|
2024-01-11 | Laurent Simon Don't Interrupt Me While I Type | 15:00 | 0 | |
|
2024-01-11 | Frederick Douglas Salmon Robust Proxy Distribution for Censorship Circumvention | 12:25 | 2 | |
|
2024-01-11 | Aaron Johnson Opening Keynote HotPETS 2016 | 9:41 | 1 | |
|
2024-01-11 | Albert Kwon Riffle Efficient Communication System With Strong Anonymity | 14:49 | 3 | |
|
2024-01-10 | Android Unlock Pattern Marte Løge | 8:46 | 2 | |
|
2024-01-10 | Cryptoprocessing on the Arduino | 13:02 | 3 | |
|
2024-01-10 | Jacob Abbott | 12:37 | 0 | |
|
2024-01-10 | Jeunese Payne | 23:53 | 0 | |
|
2024-01-10 | Jon Millican Facebook OpenPGP Support | 22:11 | 0 | |
|
2024-01-10 | Keynote 1 Chris Wysopal | 40:31 | 1 | |
|
2024-01-10 | Simon Parkin Assessing the User Experience of Password Reset Policies in a University | 18:49 | 1 | |
|
2024-01-10 | Keynote 2 Angela Sasse | 47:52 | 1 | |
|
2024-01-10 | Alexandra Strigunkova To whom it s not concern | 27:49 | 0 | |
|
2024-01-10 | Markus Dürmuth and Maximillian Golla Framework for Comparing Password Guessing Strategies | 21:46 | 0 | |
|