This paper examines the vulnerability of UNIX to … increased the crypts/second/dollar ratio by five orders of … solutions to the problem of easily found passwords. … were necessary for their success. … We conclude that the single most important step …
Google-1
Google-2
Copyright clearance needed for quotation.