@incollection{, 3B3CA8BA6C00626F1FC15782514F4C8C , author={{MeetikaMalhotra} and {BhushanDua} and {Kurukshetra University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1374548 } @book{b0, , author={{ GZorn } and { SCobb }} , title={{Microsoft LM: Microsoft PPP CHAP Extensions" Microsoft Corporation}} , year={October 1998} } @incollection{b1, , title={{A Cryptanalytic Time Memory Trade-Off}} , author={{ EricGlass }} , booktitle={{The NTLM Authentication Protocol and Security Support Provider}} O'Reilly Media , publisher={IEEE} , year={2006. 2003. November 2004. July 1980} 3 , note={HELLMAN MARTIN E, FELLOW, IEEE} } @book{b2, , title={{Making a Faster Cryptanalytic Time-Memory Trade-Off}} , author={{ SwitzerlandLausanne }} } @book{b3, , title={{A Comparison of the Security of Windows NT and UNIX}} , editor={Hans Hedbom 1, 2, Stefan Lindskog 1, 2, Stefan Axelsson1 and Erland Jonsson1} 1 Dept of Computer Engineering Chalmers University of Technology S-412 96 Goteborg, SWEDEN, 2. Dept. of Computer Science University of Karlstad S-651 } @book{b4, , author={{ SwedenKarlstad }} , title={{Third Nordic Workshop on Secure IT Systems, NORDSEC' 98}} Trondheim, Norway , year={5-6 November, 1998} } @book{b5, , title={{All in a day's work: Password cracking for the rest of us}} , author={{ JorgenBlakstad1 } and { RuneWalsø Nergård1 } and { MartinGilje Jaatun2 } and { DaniloGligoroski2 }} , note={1 ITEM, NTNU. 2SINTEF ICT} } @book{b6, , title={{Cryptography and Network Security: Principles and Practice (5th Ed}} , author={{ WilliamStallings }} , year={2010} , publisher={Prentice Hall Press} , address={Upper Saddle River, NJ, USA} }