Attack!

Results: 9771



#Item
871Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
872Geography of California / California / Attack on Pearl Harbor / Diablo Range / Mount Diablo / Pearl Harbor Survivors Association / National Pearl Harbor Remembrance Day / Diablo / Beacon /  New York / Concord /  California

Media Release, December 5, 2013 Contacts: Beryl Anderson, , Communications Manager at Save Mount Diablo Pearl Harbor Day Beacon Lighting Ceremony Moved Due to Weather

Add to Reading List

Source URL: www.savemountdiablo.org

Language: English - Date: 2013-12-06 15:35:33
873

FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks Haopei Wang Lei Xu

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2015-07-01 22:01:23
    874Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

    Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

    Add to Reading List

    Source URL: www.guanotronic.com

    Language: English - Date: 2011-01-14 11:12:10
    875

    Losing Control of the Internet: Using the Data Plane to Attack the Control Plane Max Schuchard University of Minnesota schuch @ cs.umn.edu

    Add to Reading List

    Source URL: people.cis.ksu.edu

    Language: English - Date: 2011-07-01 14:16:47
      876

      Intro to consensus A simple form of consensus: the “two-generals problem” Two armies want to attack a fortified city. Both armies need to attack at the same time in order to succeed. The armies can only communicate t

      Add to Reading List

      Source URL: courses.cs.washington.edu

      Language: English - Date: 2013-05-02 12:56:27
        877

        A Practical Second-Order Fault Attack against a Real-World Pairing Implementation

        Add to Reading List

        Source URL: conferenze.dei.polimi.it

        Language: English - Date: 2014-10-24 13:14:36
          878Domain name system / Internet / Character encoding / Internationalized domain names / Top-level domains / Cyrillic script / .org / . / IDN homograph attack

          .tel Russian Language IDN Policy March 2015 .tel Russian Language IDN Policy March 2015

          Add to Reading List

          Source URL: d21po8gip7hnk5.cloudfront.net

          Language: English - Date: 2015-06-24 16:01:39
          879Mathematics / Comics / Algebraic graph theory / Conductance / Matrices / Probability theory / Sybil attack / Marcus Junius Brutus the Younger / Dogmatix / Asterix / Renren / Fiction

          IEEE Symposium on Security & Privacy
 SAN FRANCISCO – 21ST MAY 2013 SoK: The Evolution of Sybil Defense via Social Networks
 Alessandro Epasto1

          Add to Reading List

          Source URL: www.epasto.org

          Language: English - Date: 2015-09-24 11:21:14
          UPDATE