All your SAP P@$$w0ЯdZ belong to us
Proof of work as an additional factor of authentication
Target specific automated dictionary generation
The future of mobile authentication is here
Bitslice DES with LOP3.LUT
Password hashing delegation: how to get clients work for you
Net hashes: a review of many network protocols
Throw the User ID Down the Well
Energy-efficient bcrypt cracking
Password Generators & Extended Character Set Passwords
The problem with the real world
Encryption and Authentication: Passwords for all reasons.
Password Topology Histogram Wear-Leveling, a.k.a. PathWell
Enhancing Password Based Key Derivation Techniques
Beam Me Up Scotty! – Passwords in the Enterprise
Capturing Passwords into the Secure Desktop
Closing Keynote - Special Surprise Guest
Bsides Pool Party feat. One More Time — Sponsored by Ionic Security