Attack

Results: 9771



#Item
101

ANALYSIS OF PUBLIC-KEY ENCRYPTION SCHEMES IN EXTENDED ATTACK MODELS Dale Luke Sibborn

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2016-01-11 06:40:42
    102

    Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

    Add to Reading List

    Source URL: www.cryptolux.org

    Language: English - Date: 2016-06-09 06:04:52
      103

      ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

      Add to Reading List

      Source URL: ccl.northwestern.edu

      Language: English - Date: 2018-05-15 12:56:11
        104

        Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

        Add to Reading List

        Source URL: cipherdyne.org

        Language: English - Date: 2015-07-08 09:34:47
          105

          January 26, 2018 GPASecret Service Warns of Sophisticated ATM Jackpotting Attack (Washington, D.C.) – On this date, The United States Secret Service issued

          Add to Reading List

          Source URL: www.secretservice.gov

          Language: English - Date: 2018-01-29 16:01:47
            106

            COUNTER-ATTACK NEMATODES Stop Nematodes for Healthier Roots, Stronger Stands and Higher Yields with the Proven Power of COUNTER® 20G Insecticide/Nematicide. Rootworm Trait Corn: COUNTER 20G vs. Untreated — 2012

            Add to Reading List

            Source URL: www.amvac-offers.com

            Language: English - Date: 2018-04-19 14:51:22
              107Cryptography / Elliptic curve cryptography / OpenSSL / Elliptic-curve cryptography / Elliptic curve / Elliptic-curve DiffieHellman / Elliptic Curve Digital Signature Algorithm / Conversion

              Practical realisation and elimination of an ECC-related software bug attack? B. B. Brumley1 , M. Barbosa2 , D. Page3 , and F. Vercauteren4 1 Department of Information and Computer Science, Aalto University School of Scie

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2012-03-06 09:58:08
              108

              Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin Shandong University, Tsinghua University FSE 2017

              Add to Reading List

              Source URL: www.nuee.nagoya-u.ac.jp

              Language: English - Date: 2017-03-06 23:19:26
                UPDATE