Attack!

Results: 9771



#Item
971IAC-03-IAASETI SNEAK ATTACK: LESSONS LEARNED FROM THE PEARL HARBOR HOAX H. Paul Shuch, Ph.D. Executive Director, The SETI League, Inc. PO Box 555, Little Ferry NJUSA

IAC-03-IAASETI SNEAK ATTACK: LESSONS LEARNED FROM THE PEARL HARBOR HOAX H. Paul Shuch, Ph.D. Executive Director, The SETI League, Inc. PO Box 555, Little Ferry NJUSA

Add to Reading List

Source URL: avsport.org

Language: English - Date: 2013-08-31 14:05:15
    972What is Asthma? Normal Airway Asthmatic Airway  Asthma Attack

    What is Asthma? Normal Airway Asthmatic Airway Asthma Attack

    Add to Reading List

    Source URL: www.bostonscientific.com

    Language: English - Date: 2016-03-04 16:03:59
      973Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

      Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

      Add to Reading List

      Source URL: www.rocq.inria.fr

      Language: English - Date: 2006-03-23 08:13:04
      974Codenomicon-AppCheck-Symbol-Lock

      Codenomicon-AppCheck-Symbol-Lock

      Add to Reading List

      Source URL: www.codenomicon.com

      Language: English - Date: 2016-03-02 04:58:12
      975Global Chinese Phishing Attack Trends ReportNational Engineering Laboratory for Naming and Addressing

      Global Chinese Phishing Attack Trends ReportNational Engineering Laboratory for Naming and Addressing

      Add to Reading List

      Source URL: www1.cnnic.cn

      Language: English - Date: 2015-08-07 03:12:20
        976The Shape and Size of Threats: Defining a Networked System’s Attack Surface Eric Osterweil   Danny McPherson

        The Shape and Size of Threats: Defining a Networked System’s Attack Surface Eric Osterweil Danny McPherson

        Add to Reading List

        Source URL: irtf.org

        Language: English - Date: 2016-01-05 05:04:04
          977Partial Disclosure of Votes in STV Elections Lee Naish  number of candidates. This method of coercion is known as “the Italian attack” after its

          Partial Disclosure of Votes in STV Elections Lee Naish number of candidates. This method of coercion is known as “the Italian attack” after its

          Add to Reading List

          Source URL: www.votingmatters.org.uk

          Language: English - Date: 2013-04-06 15:38:44
            97817 SeptemberBuffer Overflow Attack with Multiple Fault Injection and a Proven Countermeasure  PROOFS2015, Saint Malo, France

            17 SeptemberBuffer Overflow Attack with Multiple Fault Injection and a Proven Countermeasure PROOFS2015, Saint Malo, France

            Add to Reading List

            Source URL: www.proofs-workshop.org

            Language: English
              979An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais  Jean-Pierre Tillich

              An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais Jean-Pierre Tillich

              Add to Reading List

              Source URL: pqcrypto2013.xlim.fr

              Language: English - Date: 2013-06-24 09:56:08
                980Analyses of Social Issues and Public Policy, 2002, pp. 5–8  In the Wake of Terrorist Attack, Hatred May Mask Fear Jennifer J. Freyd* University of Oregon

                Analyses of Social Issues and Public Policy, 2002, pp. 5–8 In the Wake of Terrorist Attack, Hatred May Mask Fear Jennifer J. Freyd* University of Oregon

                Add to Reading List

                Source URL: pages.uoregon.edu

                Language: English - Date: 2013-03-19 15:06:51