Attack!

Results: 9771



#Item
831A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-17 07:57:12
832MARCHISSUE # 6 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

MARCHISSUE # 6 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

Add to Reading List

Source URL: www.scotlandrussiaforum.org

Language: English - Date: 2016-03-04 13:30:10
    833Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1  Ecole Polytechnique F´ed´erale de Lausanne, Switzerland

    Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1 Ecole Polytechnique F´ed´erale de Lausanne, Switzerland

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-04-19 04:50:18
      834ATTACK OF THE MUTANT SUFFIX TREES N. JESPER LARSSON Abstract. This is a thesis for the degree of filosofie licentiat (a Swedish degree between Master of Science and Ph.D.). It comprises three articles, all treating varia

      ATTACK OF THE MUTANT SUFFIX TREES N. JESPER LARSSON Abstract. This is a thesis for the degree of filosofie licentiat (a Swedish degree between Master of Science and Ph.D.). It comprises three articles, all treating varia

      Add to Reading List

      Source URL: www.larsson.dogma.net

      Language: English - Date: 2003-04-20 16:56:01
        835Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao

        Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao

        Add to Reading List

        Source URL: www.cs.ucsb.edu

        Language: English - Date: 2010-12-04 23:25:19
        836CASE STUDY  Uncovering and Stopping the Effects of a DoS Bot Attack Why Wind Telecomunicazioni SpA chose CloudShield DNS Defender®

        CASE STUDY Uncovering and Stopping the Effects of a DoS Bot Attack Why Wind Telecomunicazioni SpA chose CloudShield DNS Defender®

        Add to Reading List

        Source URL: lgscout.com

        Language: English - Date: 2015-08-19 18:15:21
          837Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA) Patrizia Martini Marco Cremonini

          Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA) Patrizia Martini Marco Cremonini

          Add to Reading List

          Source URL: infosecon.net

          Language: English - Date: 2006-03-16 20:15:32
            838BHATT MURPHY SOLICITORS PRESS RELEASE 22 JuneFOR IMMEDIATE RELEASE)  Inquiry into Islamophobic prison attack

            BHATT MURPHY SOLICITORS PRESS RELEASE 22 JuneFOR IMMEDIATE RELEASE) Inquiry into Islamophobic prison attack

            Add to Reading List

            Source URL: www.bhattmurphy.co.uk

            Language: English - Date: 2015-06-22 07:06:25
              839Introduction Grain Family of Stream Ciphers Fault model The Attack  A Differential Fault Attack on Grain-128a using

              Introduction Grain Family of Stream Ciphers Fault model The Attack A Differential Fault Attack on Grain-128a using

              Add to Reading List

              Source URL: cse.iitkgp.ac.in

              Language: English - Date: 2013-10-16 11:27:05
                840Information protection Frequently Asked Questions What happened? On January 27, 2015, we discovered that malware had been installed on some of Aurora’s workstations and servers via a sophisticated cyber attack. Immedia

                Information protection Frequently Asked Questions What happened? On January 27, 2015, we discovered that malware had been installed on some of Aurora’s workstations and servers via a sophisticated cyber attack. Immedia

                Add to Reading List

                Source URL: krebsonsecurity.com

                Language: English - Date: 2015-03-18 11:21:28