Attack time

Results: 284



#Item
191Secure communication / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs, David Isaac Wolinsky, and Bryan Ford Yale University Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-26 19:19:46
192Identity management / Security token / One-time password / Electronic authentication / Authentication / Multi-factor authentication / Password / Identity assurance / Replay attack / Security / Computer security / Access control

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-006

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-25 12:06:27
193RSA / Denial-of-service attack / Transport Layer Security / Public key certificate / Online Certificate Status Protocol / Revocation list / PKCS / Certificate authority / Cryptography / Public-key cryptography / Digital signature

Enhancing Security of Security-Mediated PKI by One-time ID Satoshi Koga1 , Kenji Imamoto1 , and Kouichi Sakurai2 1 Graduate School of Information Science and Electrical Engineering,

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 09:11:46
194National security / Iraq War casualties / Palestinian militant groups / Israeli–Palestinian conflict / Ethics / Sociology / International Law and the Gaza War / Palestinian political violence / Crime / War in Afghanistan / Violence

MeTHODOLOGY his study, undertaken under the auspices of GCPEA, builds on the previous two Education under Attack studies published by UNESCO in 2007 and[removed]For the first time, it is published by a group of agencies ra

Add to Reading List

Source URL: www.protectingeducation.org

Language: English - Date: 2014-02-27 12:26:25
195Creech Air Force Base / General Atomics MQ-9 Reaper / 42d Attack Squadron / 432d Wing / Indian Springs /  Nevada / Nevada / Aviation

EXECUTIVE SUMMARY AIRCRAFT ACCIDENT INVESTIGATION MQ-9, T/N[removed], CREECH AIR FORCE BASE, NEVADA 20 MARCH 2009 On 20 March 2009, at approximately 1605 Mountain Daylight Time (MDT), the mishap remotely-piloted aircraft

Add to Reading List

Source URL: usaf.aib.law.af.mil

Language: English - Date: 2012-02-29 20:34:54
196Mental health / Panic disorder / Panic attack / Social anxiety disorder / Agoraphobia / Phobia / Social anxiety / Cognitive behavioral therapy / Anxiety / Psychiatry / Abnormal psychology / Anxiety disorders

Winter[removed]DEALING WITH PANIC DISORDER Hello and Welcome to 2005! It’s amazing how quickly time flies! I have been in the position of President since July

Add to Reading List

Source URL: www.anxietybc.com

Language: English - Date: 2012-06-07 17:53:51
197Cryptography / Password / Passphrase / One-time password / Two-factor authentication / Cryptographic software / Security token / Crypt / Dictionary attack / Security / Computer security / Access control

Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:04
198Domain name system / Computer network security / Ping / Traceroute / Internet Control Message Protocol / MX record / Denial-of-service attack / Dynamic DNS / Computing / Internet / Network architecture

Packets Found on an Internet Steven M. Bellovin August 23, 1993 Abstract As part of our security measures, we spend a fair amount of time and e ort looking for things that

Add to Reading List

Source URL: grox.net

Language: English - Date: 1999-06-30 05:38:31
199Network architecture / Traceroute / IP address spoofing / Ip / Ingress filtering / Reverse path forwarding / ICMP Time Exceeded / Denial-of-service attack / Internet Protocol / Computer network security / Computing / Internet

Tracefilter: A Tool for Locating Network Source Address Validation Filters ∗ USENIX Security ’07 Poster Robert Beverly

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2007-09-18 11:32:20
200Espionage / Malware / Botnet / Internet security / Spyware / Attack / Computer worm / Trojan horse / Computer crime / Computer network security / Cyberwarfare / Computer security

Monthly Cyber Security Tips – NEWSLETTER January 2010 Volume 5, Issue 1 Cyber Security Trends for 2010 As we begin the new year, it’s an opportune time to assess the cyber security landscape and prepare for what new

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:18:55
UPDATE