Attack!

Results: 9771



#Item
741Microsoft / Software / Computing / Webmail / Password / Security / Outlook.com / Email / Login / Point and click / Self-service password reset / Semantic URL attack

Guide 5 – E-mail address is in use Use these instructions if: You already created a NY.GOV ID, but not with the Department of Labor and You received a message telling you your e-mail address is already in use If you ge

Add to Reading List

Source URL: www.labor.ny.gov

Language: English - Date: 2013-03-01 17:05:53
742Cryptography / Cryptanalysis / Chosen-ciphertext attack / Block cipher / Data Encryption Standard / Chosen-plaintext attack / Strong cryptography / Cryptographic hash function / Known-plaintext attack / Key / Ciphertext-only attack / Ciphertext

Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-12-11 07:25:27
743

Stop the Frack Attack Advisory Council Julie Archer, West Virginia Stephen Cleghorn, Pennsylvania John Fenton, Wyoming Robert Finne, Arkansas

Add to Reading List

Source URL: www.stopthefrackattack.org

Language: English - Date: 2013-06-14 16:53:45
    744Cyberwarfare / Computing / Computer security / Computer network security / Internet security / Cryptography / Cybercrime / Electronic voting / Malware / Denial-of-service attack / Computer virus / Computer worm

    Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

    Add to Reading List

    Source URL: avirubin.com

    Language: English - Date: 2012-11-01 14:51:07
    745

    USB Device Drivers: A Stepping Stone into your Kernel Moritz Jodeit n.runs AG Nassauer Str. 60, DOberursel Abstract—The widely–used Universal Serial Bus (USB) exposes a physical attack

    Add to Reading List

    Source URL: www.jodeit.org

    Language: English - Date: 2015-01-09 09:19:17
      746

      Challengers from the Sidelines Understanding America’s Violent Far-Right Arie Perliger ‘Field of Empty Chairs’ is part of the Oklahoma City National Memorial which commemorates the victims killed in the 1995 attack

      Add to Reading List

      Source URL: info.publicintelligence.net

      Language: English - Date: 2014-01-16 23:51:52
        747

        Length extension attack on narrow-pipe SHA-3 candidates Danilo Gligoroski Department of Telematics, Norwegian University of Science and Technology, O.S.Bragstads plass 2B, N-7491 Trondheim, NORWAY danilo.gligoroski@item.

        Add to Reading List

        Source URL: people.item.ntnu.no

        Language: English - Date: 2010-11-16 03:53:36
          748Cryptography / Stream ciphers / RC4 / Keystream / Fluhrer /  Mantin and Shamir attack / Distinguishing attack

          Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2016-02-22 02:10:52
          749

          Mathematical Recreation Versus Mathematical Knowledge Mark Colyvan∗ Abstract It is often assumed that empiricism in the philosophy of mathematics was laid to rest by Frege’s stinging attack on Mill. I will argue that

          Add to Reading List

          Source URL: www.colyvan.com

          Language: English - Date: 2012-07-01 12:59:51
            750

            On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack Svitlana Vyetrenko Aditya Khosla

            Add to Reading List

            Source URL: www.its.caltech.edu

            Language: English - Date: 2010-10-15 13:27:00
              UPDATE