


default search action
BibTeX record conf/eciw/FragkosXB05
@inproceedings{DBLP:conf/eciw/FragkosXB05, author = {Grigorios Fragkos and Konstantinos Xynos and Andrew Blyth}, title = {The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {99--106}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Thu, 23 Jun 2016 15:53:29 +0200}, biburl = {https://dblp.org/rec/conf/eciw/FragkosXB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.