Attack!

Results: 9771



#Item
881Attack, solution and verification for shared authorisation data in TCG TPM Liqun Chen and Mark Ryan HP Labs, UK, and University of Birmingham, UK

Attack, solution and verification for shared authorisation data in TCG TPM Liqun Chen and Mark Ryan HP Labs, UK, and University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-09-11 10:36:45
    882Background on EMV A New Attack on EMV Positive Results Concluding Remarks  On the Joint Security of Encryption and Signature in EMV Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart and Mario Strefl

    Background on EMV A New Attack on EMV Positive Results Concluding Remarks On the Joint Security of Encryption and Signature in EMV Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart and Mario Strefl

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2012-02-29 10:40:25
      883TM  JCAT: An environment for attack and test on Java Card Serge C HAUMETTE  ∗

      TM JCAT: An environment for attack and test on Java Card Serge C HAUMETTE ∗

      Add to Reading List

      Source URL: damien.sauveron.fr

      Language: English - Date: 2013-02-26 15:54:32
        884The Meaning of Attack-Resistant Systems Vijay Ganesh Sebastian Banescu  Mart´ın Ochoa

        The Meaning of Attack-Resistant Systems Vijay Ganesh Sebastian Banescu Mart´ın Ochoa

        Add to Reading List

        Source URL: software.imdea.org

        Language: English - Date: 2015-07-09 06:40:16
          885Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

          Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-05-20 23:58:55
          886  [ MANAGED SECURITY SERVICES ] ANATOMY OF THE ATTACK: PHISHING

            [ MANAGED SECURITY SERVICES ] ANATOMY OF THE ATTACK: PHISHING

          Add to Reading List

          Source URL: www.rooksecurity.com

          Language: English - Date: 2015-01-20 15:31:50
            887An Empirical Analysis of the Current State of Phishing Attack and Defence Tyler Moore and Richard Clayton Computer Laboratory, University of Cambridge 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom {tyler.moore}

            An Empirical Analysis of the Current State of Phishing Attack and Defence Tyler Moore and Richard Clayton Computer Laboratory, University of Cambridge 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom {tyler.moore}

            Add to Reading List

            Source URL: weis07.infosecon.net

            Language: English - Date: 2013-09-01 23:27:25
              888Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam  Sungkyunkwan University

              Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam Sungkyunkwan University

              Add to Reading List

              Source URL: conferences2.sigcomm.org

              Language: English - Date: 2015-10-01 13:11:48
              889Motivation  RC4 in TLS Attack Setting

              Motivation RC4 in TLS Attack Setting

              Add to Reading List

              Source URL: www.usenix.org

              Language: English - Date: 2015-08-19 13:12:21
                890JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

                JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

                Add to Reading List

                Source URL: www.jpcert.or.jp

                Language: English - Date: 2015-06-29 20:52:09