Attack!

Results: 9771



#Item
431Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Biometrics / Certificate authority / Man-in-the-middle attack / X.509 / Authentication / Key / Revocation list / Public key certificate

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
432Nuclear warfare / Military communications / TACAMO / Lockheed EC-130 / Minimum Essential Emergency Communications Network / Post-Attack Command and Control System / Very low frequency / Boeing E-4 / Air Force Satellite Communications / AN/DRC-8 Emergency Rocket Communications System / Lockheed C-130 Hercules

UNCLASSIFIED NAVAIRDEVCEN TECHNICAL REVIEW

Add to Reading List

Source URL: www.navy-radio.com

Language: English - Date: 2014-08-16 21:47:59
433File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
434File sharing / Distributed data storage / Analytic geometry / Coordinate system / Node / Peer-to-peer / Leader election

The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems ERIC CHAN-TIN, Oklahoma State University VICTOR HEORHIADI, NICHOLAS HOPPER, and YONGDAE KIM, University of Minnesota A network coordinate system

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2012-10-09 12:59:43
435Aerodynamics / Wingtip device / Airfoil / Lift-induced drag / Camber / Lift / Foil / Angle of attack / Swept wing / Chord / Propeller / Stall

Microsoft Word - EXHIBIT A.doc

Add to Reading List

Source URL: www.aviationpartners.com

Language: English - Date: 2012-01-25 21:17:57
436Transport Layer Security / Secure communication / Cryptography / E-commerce / Cryptographic protocols / DROWN attack / Padding oracle attack / OpenSSL / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Padding

Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

Add to Reading List

Source URL: drownattack.com

Language: English - Date: 2016-07-01 21:14:30
437Distributed data storage / Computer network security / Reputation management / Sybil attack / Distributed hash table / Routing / Flow network / Distributed computing

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-02-20 17:16:43
438Internet protocols / Internet Standards / Diameter / Hypertext Transfer Protocol / Denial-of-service attack / Differentiated services / Short Message Service / Transmission Control Protocol / Session Initiation Protocol

Internet Engineering Task Force (IETF) Request for Comments: 7944 Category: Standards Track ISSN: S. Donovan

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2016-08-04 20:02:00
439Bears / Grizzly bear / Grizzly / Brown bear / California grizzly bear / The Bear / Bear attack / Vital Ground

trailtalk Grizzlies in the North Cascades Unbearable to ponder or barely a concern by Craig Romano, Guidebook author Like my first love, I’ll never forget my first grizzly bear encounter.

Add to Reading List

Source URL: www.northcascadesgrizzly.org

Language: English - Date: 2016-05-25 19:19:39
440Chess openings / World Chess Championship

Mini-Lessons from Short Games of the 21st Century by IM Nikolay Minev #4: Double-Attack With A Rook Double-attack is the most common tactical element, and plays a part (in actuality or only possibility) in almost every g

Add to Reading List

Source URL: www.thechesslibrary.com

Language: English - Date: 2009-08-01 20:08:31
UPDATE