Securing Passwords against Dictionary Attacks Benny Pinkas, Tomas Sander HP Labs (most work done at STAR Lab, Intertrust)
Introduction to Software Exploitation Corey K.. All materials is licensed under a Creative Commons Share Alike license.
7.3. iCloud keychain-2
6.1. iCloud keychain and iOS 7 data protection
ICloud Keychain and IOS 7 Data Protection presentation
Registrars and Security Greg Rattray Chief Internet Security Advisor.
Online Exam Monitoring With Password Resistant Protocol