Attack!

Results: 9771



#Item
101ANALYSIS OF PUBLIC-KEY ENCRYPTION SCHEMES IN EXTENDED ATTACK MODELS Dale Luke Sibborn

ANALYSIS OF PUBLIC-KEY ENCRYPTION SCHEMES IN EXTENDED ATTACK MODELS Dale Luke Sibborn

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2016-01-11 06:40:42
    102Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

    Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

    Add to Reading List

    Source URL: www.cryptolux.org

    Language: English - Date: 2016-06-09 06:04:52
      103ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

      ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

      Add to Reading List

      Source URL: ccl.northwestern.edu

      Language: English - Date: 2018-05-15 12:56:11
        104Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

        Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

        Add to Reading List

        Source URL: cipherdyne.org

        Language: English - Date: 2015-07-08 09:34:47
          105January 26, 2018 GPASecret Service Warns of Sophisticated ATM Jackpotting Attack (Washington, D.C.) – On this date, The United States Secret Service issued

          January 26, 2018 GPASecret Service Warns of Sophisticated ATM Jackpotting Attack (Washington, D.C.) – On this date, The United States Secret Service issued

          Add to Reading List

          Source URL: www.secretservice.gov

          Language: English - Date: 2018-01-29 16:01:47
            106COUNTER-ATTACK NEMATODES Stop Nematodes for Healthier Roots, Stronger Stands and Higher Yields with the Proven Power of COUNTER® 20G Insecticide/Nematicide.  Rootworm Trait Corn: COUNTER 20G vs. Untreated — 2012

            COUNTER-ATTACK NEMATODES Stop Nematodes for Healthier Roots, Stronger Stands and Higher Yields with the Proven Power of COUNTER® 20G Insecticide/Nematicide. Rootworm Trait Corn: COUNTER 20G vs. Untreated — 2012

            Add to Reading List

            Source URL: www.amvac-offers.com

            Language: English - Date: 2018-04-19 14:51:22
              107Practical realisation and elimination of an ECC-related software bug attack? B. B. Brumley1 , M. Barbosa2 , D. Page3 , and F. Vercauteren4 1 Department of Information and Computer Science, Aalto University School of Scie

              Practical realisation and elimination of an ECC-related software bug attack? B. B. Brumley1 , M. Barbosa2 , D. Page3 , and F. Vercauteren4 1 Department of Information and Computer Science, Aalto University School of Scie

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2012-03-06 09:58:08
              108Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin Shandong University, Tsinghua University FSE 2017

              Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin Shandong University, Tsinghua University FSE 2017

              Add to Reading List

              Source URL: www.nuee.nagoya-u.ac.jp

              Language: English - Date: 2017-03-06 23:19:26