Attack!

Results: 9771



#Item
931

PComP™ M MesoCoat Inc. proposed novel nano-composite, solid lubricant coatings generated by High Velocity Oxygen Fuel (HVOF) spraying of nano/mesostructured powders to reduce the liquid metal attack to the tooling. Th

Add to Reading List

Source URL: mesocoat.com

Language: English - Date: 2014-08-07 09:15:41
    932

    A Practical Attack on the MIFARE Classic Gerhard de Koning Gans, Jaap-Henk Hoepman, and Flavio D. Garcia Institute for Computing and Information Sciences Radboud University Nijmegen P.O. Box 9010, 6500 GL Nijmegen, The N

    Add to Reading List

    Source URL: www.proxmark.org

    Language: English - Date: 2008-06-10 11:53:34
      933

      Integral Attack Goes More than Impossible Differential Attack for LBlock Yu Sasaki1, Lei Wang2 1:

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-08-28 23:45:50
        934

        Soha Cloud Soha Cloud - Secure Access to Applications AirGAP you applications to reduce your attack surface to zero Enterprises have spent billions securing the entry points into their networks from the Internet. Yet meg

        Add to Reading List

        Source URL: soha.io

        Language: English - Date: 2015-08-08 13:21:02
          935

          Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

          Add to Reading List

          Source URL: www.csc.ncsu.edu

          Language: English - Date: 2015-07-12 13:03:46
            936

            Read It Twice! A mass-storage-based TOCTTOU attack Collin Mulliner and Benjamin Mich´ele Security in Telecommunications Technische Universit¨

            Add to Reading List

            Source URL: www.mulliner.org

            Language: English - Date: 2012-08-17 14:41:57
              937

              24 Strategic Defense and Attack of Complex Networks

              Add to Reading List

              Source URL: weis07.infosecon.net

              Language: English - Date: 2013-09-01 23:27:25
                938

                Regeneration and Growth Following MPB Attack: A Synthesis of Knowledge Workshop and Field Tour September 23 and 24, 2008 University of Northern British Columbia Prince George, BC

                Add to Reading List

                Source URL: web.unbc.ca

                Language: English - Date: 2008-09-21 01:09:07
                  939Domain name system / Top-level domains / Internationalized domain names / .org / IDN homograph attack / Internationalized country code top-level domain

                  .tel Latvian Language IDN Policy March 2015 .tel Latvian Language IDN Policy March 2015

                  Add to Reading List

                  Source URL: d21po8gip7hnk5.cloudfront.net

                  Language: English - Date: 2015-06-24 16:02:04
                  940Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

                  Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

                  Add to Reading List

                  Source URL: isc2015.item.ntnu.no

                  Language: English - Date: 2015-09-20 14:16:36
                  UPDATE