All your SAP P@$$w0ЯdZ belong to us
Authentication in the Cloud – Building Service
Beam Me Up Scotty! – Passwords in the Enterprise
Bitslice DES with LOP3.LUT
Bsides Pool Party feat. One More Time — Sponsored by Ionic Security
Capturing Passwords into the Secure Desktop
Closing Keynote - Special Surprise Guest
Defense with 2FA
DoCatsLikeLemon? – Advanced phrase attacks and analysis
Encryption and Authentication: Passwords for all reasons.
Energy-efficient bcrypt cracking
Enhancing Password Based Key Derivation Techniques
Highlights of CMU’s Recent Work in Preventing Bad Passwords
How EFF is Making STARTTLS Resistant to Active Attacks
How Forced Password Expiration Affects Password Choice
How we deciphered millions of users’ encrypted passwords without the decryption keys.
I have the #cat so I make the rules
Is Pavlovian Password Management The Answer?
Net hashes: a review of many network protocols
Opening Keynote
Password Generators & Extended Character Set Passwords
Password Hashing Competition: the Candidates
Password hashing delegation: how to get clients work for you
PasswordsCon Pool Party feat. DJ Keith Myers — Sponsored by Stricture Group
Password Security in the PCI DSS
Passwords Opening Keynote
Password Topology Histogram Wear-Leveling, a.k.a. PathWell
Penetrate your OWA
Proof of work as an additional factor of authentication
Secure your email – Secure your password
Security for the People: End-User Authentication Security on the Internet
Target specific automated dictionary generation
The future of mobile authentication is here
The problem with the real world
Throw the User ID Down the Well
Tradeoff cryptanalysis of password hashing schemes
Using cryptanalysis to speed-up password cracking
Welcome & Announcements
What Microsoft would like from the Password Hashing Competition