The password allocation problem: strategies for reusing passwords effectivelyJan 1, 2013·Rishab Nithyanand,Rob Johnson· 0 min read CiteTypeConference paperPublicationProceedings of the 12th ACM workshop on Workshop on privacy in the electronic societyLast updated on Jan 1, 2013 ← Gone, But Not Forgotten: The Current State of Private Computing Jan 1, 2013CAWDOR: compiler assisted worm defense Jan 1, 2012 →