Malicious

Results: 683



#Item
1Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Add to Reading List

Source URL: snap.stanford.edu

Language: English - Date: 2017-04-03 00:44:26
3Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications Omar Alrawi Aziz Mohaisen

Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications Omar Alrawi Aziz Mohaisen

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:41:27
4Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Add to Reading List

Source URL: snap.stanford.edu

Language: English - Date: 2017-04-03 00:39:08
5A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority

A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
    6Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

    Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

    Add to Reading List

    Source URL: snap.stanford.edu

    Language: English - Date: 2017-04-03 00:39:03
    7DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

    DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    8Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

    Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

    Add to Reading List

    Source URL: snap.stanford.edu

    - Date: 2017-04-03 00:39:09
      9Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

      Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

      Add to Reading List

      Source URL: snap.stanford.edu

      Language: English - Date: 2017-04-03 00:44:44
      10Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries

      Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries

      Add to Reading List

      Source URL: acmccs.github.io

      Language: English - Date: 2017-12-30 21:51:59