Attack!

Results: 9771



#Item
891Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
892Report  Black Hat 2015: State of Security Endpoint Risk Overshadows All Others

Report Black Hat 2015: State of Security Endpoint Risk Overshadows All Others

Add to Reading List

Source URL: www.bromium.com

Language: English
893A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

Add to Reading List

Source URL: tls.mbed.org

Language: English
894.tel Norwegian Language IDN Policy March 2015 .tel Norwegian Language IDN Policy March 2015

.tel Norwegian Language IDN Policy March 2015 .tel Norwegian Language IDN Policy March 2015

Add to Reading List

Source URL: d21po8gip7hnk5.cloudfront.net

Language: English - Date: 2015-06-24 16:02:02
895Breaking ecc2-113: Efficient Implementation of an Optimized Attack on a Reconfigurable Hardware Cluster Susanne Engels  Master’s Thesis. February 22, 2014.

Breaking ecc2-113: Efficient Implementation of an Optimized Attack on a Reconfigurable Hardware Cluster Susanne Engels Master’s Thesis. February 22, 2014.

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2014-11-10 16:26:38
    896Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems Hyojeong Lee, Jeff Seibert, Charles Killian and Cristina Nita-Rotaru Department of Computer Science Purdue University {hyojlee, jcseiber, ckillian, c

    Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems Hyojeong Lee, Jeff Seibert, Charles Killian and Cristina Nita-Rotaru Department of Computer Science Purdue University {hyojlee, jcseiber, ckillian, c

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2012-11-05 10:18:09
      897Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

      Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

      Add to Reading List

      Source URL: www.dgalindo.es

      Language: English - Date: 2007-11-26 10:35:37
      898MARCHISSUE # 1 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF THE CRIMEA

      MARCHISSUE # 1 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF THE CRIMEA

      Add to Reading List

      Source URL: www.scotlandrussiaforum.org

      Language: English - Date: 2016-03-04 13:30:10
        899Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

        Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

        Add to Reading List

        Source URL: www.blaseur.com

        Language: English - Date: 2015-08-12 14:36:57
        900Physical Attack Protection with Human-Secure Virtualization in Data Centers Jakub Szefer§, Pramod Jamkhedkar, Yu-Yuan Chen and Ruby B. Lee Princeton University

        Physical Attack Protection with Human-Secure Virtualization in Data Centers Jakub Szefer§, Pramod Jamkhedkar, Yu-Yuan Chen and Ruby B. Lee Princeton University

        Add to Reading List

        Source URL: conf.laas.fr

        Language: English - Date: 2012-10-19 11:14:03