831![A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i](https://www.pdfsearch.io/img/f00a8fb6bdd5d0db21433cb83251c1ee.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-02-17 07:57:12
|
---|
832![MARCHISSUE # 6 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA MARCHISSUE # 6 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA](https://www.pdfsearch.io/img/00e553a4ff0ca8ae1561d9874527e5db.jpg) | Add to Reading ListSource URL: www.scotlandrussiaforum.orgLanguage: English - Date: 2016-03-04 13:30:10
|
---|
833![Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1 Ecole Polytechnique F´ed´erale de Lausanne, Switzerland Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1 Ecole Polytechnique F´ed´erale de Lausanne, Switzerland](https://www.pdfsearch.io/img/7b1445fcf85b44524ae1a8f717105668.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-04-19 04:50:18
|
---|
834![ATTACK OF THE MUTANT SUFFIX TREES N. JESPER LARSSON Abstract. This is a thesis for the degree of filosofie licentiat (a Swedish degree between Master of Science and Ph.D.). It comprises three articles, all treating varia ATTACK OF THE MUTANT SUFFIX TREES N. JESPER LARSSON Abstract. This is a thesis for the degree of filosofie licentiat (a Swedish degree between Master of Science and Ph.D.). It comprises three articles, all treating varia](https://www.pdfsearch.io/img/0e4e463cb60e90f5d52f92eb26bd5b3c.jpg) | Add to Reading ListSource URL: www.larsson.dogma.netLanguage: English - Date: 2003-04-20 16:56:01
|
---|
835![Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao](https://www.pdfsearch.io/img/886e69d603e66fcf815671b1c7964552.jpg) | Add to Reading ListSource URL: www.cs.ucsb.eduLanguage: English - Date: 2010-12-04 23:25:19
|
---|
836![CASE STUDY Uncovering and Stopping the Effects of a DoS Bot Attack Why Wind Telecomunicazioni SpA chose CloudShield DNS Defender® CASE STUDY Uncovering and Stopping the Effects of a DoS Bot Attack Why Wind Telecomunicazioni SpA chose CloudShield DNS Defender®](https://www.pdfsearch.io/img/655344874948817eecc98fe494b6669e.jpg) | Add to Reading ListSource URL: lgscout.comLanguage: English - Date: 2015-08-19 18:15:21
|
---|
837![Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA) Patrizia Martini Marco Cremonini Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA) Patrizia Martini Marco Cremonini](https://www.pdfsearch.io/img/a85e3780d59d45a4796fb637d237fded.jpg) | Add to Reading ListSource URL: infosecon.netLanguage: English - Date: 2006-03-16 20:15:32
|
---|
838![BHATT MURPHY SOLICITORS PRESS RELEASE 22 JuneFOR IMMEDIATE RELEASE) Inquiry into Islamophobic prison attack BHATT MURPHY SOLICITORS PRESS RELEASE 22 JuneFOR IMMEDIATE RELEASE) Inquiry into Islamophobic prison attack](https://www.pdfsearch.io/img/91caab7ee785250168366f663fdbb20b.jpg) | Add to Reading ListSource URL: www.bhattmurphy.co.ukLanguage: English - Date: 2015-06-22 07:06:25
|
---|
839![Introduction Grain Family of Stream Ciphers Fault model The Attack A Differential Fault Attack on Grain-128a using Introduction Grain Family of Stream Ciphers Fault model The Attack A Differential Fault Attack on Grain-128a using](https://www.pdfsearch.io/img/a02969a910e8da28b94e38ec3b7e28bb.jpg) | Add to Reading ListSource URL: cse.iitkgp.ac.inLanguage: English - Date: 2013-10-16 11:27:05
|
---|
840![Information protection Frequently Asked Questions What happened? On January 27, 2015, we discovered that malware had been installed on some of Aurora’s workstations and servers via a sophisticated cyber attack. Immedia Information protection Frequently Asked Questions What happened? On January 27, 2015, we discovered that malware had been installed on some of Aurora’s workstations and servers via a sophisticated cyber attack. Immedia](https://www.pdfsearch.io/img/15fc347d2b526c84896c71195e6c196d.jpg) | Add to Reading ListSource URL: krebsonsecurity.comLanguage: English - Date: 2015-03-18 11:21:28
|
---|