Attack

Results: 9771



#Item
941Information theory / Philosophy of thermal and statistical physics / Pseudorandom number generators / Thermodynamic entropy / Information Age / Information flow / Side-channel attack / Entropy / Quicken Interchange Format / Information

FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings) June 29, 2013 Tulane University

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2013-06-11 09:16:04
942Reputation management / Distributed data storage / File sharing / Distributed computing / Internet television / Gossip protocol / BitTorrent / Tribler / Peer-to-peer / Ono / Social peer-to-peer processes / Sybil attack

QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable D2.1.2 Fundamental algorithms for sustaining cooperation in realis

Add to Reading List

Source URL: qlectives.eu

Language: English - Date: 2011-03-31 12:53:40
943

Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions Santanu Sarkar, Sourav Sen Gupta, and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata

Add to Reading List

Source URL: www.souravsengupta.com

Language: English - Date: 2014-03-16 03:18:01
    944Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

    Introduction MD New Results I

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    945Computing / Network architecture / Computer architecture / Denial-of-service attacks / Cyberwarfare / Emerging technologies / Internet Relay Chat / Network function virtualization / Software-defined networking / Denial-of-service attack / OpenFlow / Virtual firewall

    Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

    Add to Reading List

    Source URL: mdbailey.ece.illinois.edu

    Language: English - Date: 2015-08-05 21:41:25
    946

    Heart Attack & Stroke Causes / Prevention / Knowing what to do can save your life or a family member’s life A presentation of DHHSC’s Wednesday

    Add to Reading List

    Source URL: www.dhhsc.org

    - Date: 2015-11-19 12:29:37
      947Computer networking / Computing / Named data networking / Information-centric networking / Content centric networking / ICN / Van Jacobson / Interest Flooding Attack

      Program ACM ICN San Francisco 2015

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2015-10-02 18:16:47
      948

      A Survey of Attack and Defense Techniques for Reputation Systems KEVIN HOFFMAN Purdue University DAVID ZAGE Purdue University

      Add to Reading List

      Source URL: homes.cerias.purdue.edu

      Language: English - Date: 2008-03-31 16:28:09
        949

        Index Calculus Attack for Hyperelliptic Curves of Small Genus Nicolas Thériault University of Toronto /

        Add to Reading List

        Source URL: conf.ncku.edu.tw

        Language: English - Date: 2003-12-17 07:15:55
          950Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

          Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

          Add to Reading List

          Source URL: www.dgalindo.es

          Language: English - Date: 2007-11-26 10:35:45
          UPDATE