Attack

Results: 9771



#Item
891Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
892Security / Prevention / Computer security / National security / Crime prevention / Cryptography / Information governance / Vulnerability / Information security / Bromium / Cyber-attack / Attack

Report Black Hat 2015: State of Security Endpoint Risk Overshadows All Others

Add to Reading List

Source URL: www.bromium.com

Language: English
893Abstract algebra / Algebra / Mathematics / Modular arithmetic / Computer arithmetic / Binary operations / E-commerce / RSA / Modular exponentiation / Montgomery modular multiplication / Vienna U-Bahn / Modulo operation

A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

Add to Reading List

Source URL: tls.mbed.org

Language: English
894Punctuation / Domain name system / Internationalized domain name / Unicode blocks / Typography / Top-level domains / Tilde / .org / Diacritic / IDN homograph attack / Latin Extended-A

.tel Norwegian Language IDN Policy March 2015 .tel Norwegian Language IDN Policy March 2015

Add to Reading List

Source URL: d21po8gip7hnk5.cloudfront.net

Language: English - Date: 2015-06-24 16:02:02
895

Breaking ecc2-113: Efficient Implementation of an Optimized Attack on a Reconfigurable Hardware Cluster Susanne Engels Master’s Thesis. February 22, 2014.

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2014-11-10 16:26:38
    896

    Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems Hyojeong Lee, Jeff Seibert, Charles Killian and Cristina Nita-Rotaru Department of Computer Science Purdue University {hyojlee, jcseiber, ckillian, c

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2012-11-05 10:18:09
      897Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

      Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

      Add to Reading List

      Source URL: www.dgalindo.es

      Language: English - Date: 2007-11-26 10:35:37
      898

      MARCHISSUE # 1 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF THE CRIMEA

      Add to Reading List

      Source URL: www.scotlandrussiaforum.org

      Language: English - Date: 2016-03-04 13:30:10
        899Cryptography / Computer access control / Computer security / Password / Security / Brute-force attack / Hashcat / John the Ripper / Crypt / Guessing / Security hacker / Password fatigue

        Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

        Add to Reading List

        Source URL: www.blaseur.com

        Language: English - Date: 2015-08-12 14:36:57
        900

        Physical Attack Protection with Human-Secure Virtualization in Data Centers Jakub Szefer§, Pramod Jamkhedkar, Yu-Yuan Chen and Ruby B. Lee Princeton University

        Add to Reading List

        Source URL: conf.laas.fr

        Language: English - Date: 2012-10-19 11:14:03
          UPDATE