Attack!

Results: 9771



#Item
321Press release  Press enquiries: +www.bis.org Ref no: IOSCO/MR

Press release Press enquiries: +www.bis.org Ref no: IOSCO/MR

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2016-06-29 09:35:28
322DNSSEC Key Maintenance Analysis_final

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
323Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
324KILLING IN THE NAME OF GOD: OSAMA BIN LADEN AND AL QAEDA by Jerrold M. Post, M.D. The Counterproliferation Papers Future Warfare Series No. 18

KILLING IN THE NAME OF GOD: OSAMA BIN LADEN AND AL QAEDA by Jerrold M. Post, M.D. The Counterproliferation Papers Future Warfare Series No. 18

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 03:57:24
325Shell has taken some big knocks in the attack by a father and son in Essex, reports Danny Fortson

Shell has taken some big knocks in the attack by a father and son in Essex, reports Danny Fortson

Add to Reading List

Source URL: www.shellnews.net

Language: English - Date: 2009-09-20 19:07:21
326Randomized Partial Checking Revisited Shahram Khazaei,  Douglas Wikstr¨om,  February 13, 2012  Abstract

Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 09:04:05
327Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine  Physical attacks

Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine Physical attacks

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
328Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:55:51
329Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
330Defense Trade Advisory Group (DTAG) Cyber Working Group White Paper October 29, 2015 DTAG Working Group Members Co-chairs: Rebecca Conover & Larry Fink

Defense Trade Advisory Group (DTAG) Cyber Working Group White Paper October 29, 2015 DTAG Working Group Members Co-chairs: Rebecca Conover & Larry Fink

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2016-03-02 15:03:40