Malicious

Results: 683



#Item
181RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
182Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
183

Malicious URL Data Feed Cyber criminals launch thousands of malevolent websites every day, and compromise thousands of legitimate ones, to spread malware. The Trojans, viruses, rootkits and other malicious code these inf

Add to Reading List

Source URL: info.cyveillance.com

Language: English
    184Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

    Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2010-11-25 08:58:28
    185

    Mitigating Inadvertent Insider Threats with Incentives Debin Liu, XiaoFeng Wang and L. Jean Camp School of Informatics, Indiana University Abstract. Inadvertent insiders are trusted insiders who do not have malicious int

    Add to Reading List

    Source URL: www.ljean.com

    Language: English - Date: 2012-09-28 13:27:35
      186

      2015 年5月 15 日更新 悪質な海外ウェブサイト一覧 List of malicious overseas websites 掲載ウェブサイト総数: 280 サイト

      Add to Reading List

      Source URL: www.caa.go.jp

      - Date: 2015-05-14 20:51:59
        187

        VPN-Based Malicious IP Blocklist Firewall In addition to our DNS based malicious domain filtering which can be enabled on all our OpenVPN servers via our customized OpenVPN GUI client, Anonyproz also offers an advanced I

        Add to Reading List

        Source URL: www.anonyproz.com

        - Date: 2013-11-08 08:36:21
          188

          Introducing the SESAME project Securing the European Electricity Supply Against Malicious and accidental thrEats The Energy & Industry section is a partner in a European project called SESAME (FP7 Security), on securing

          Add to Reading List

          Source URL: intranet.tudelft.nl

          - Date: 2012-12-12 12:02:02
            189

            Affari pericolosi: Le minacce malware derivanti dal software illegale malicious + software = malware SPYWARE VIRUS

            Add to Reading List

            Source URL: globalstudy.bsa.org

            - Date: 2015-03-03 10:01:12
              190

              Spoiled Onions: Exposing Malicious Tor Exit Relays∗ Philipp Winter1 , Richard Köwer3 , Martin Mulazzani2 , Markus Huber2 , Sebastian Schrittwieser2 , Stefan Lindskog1 , and Edgar Weippl2 1

              Add to Reading List

              Source URL: www.petsymposium.org

              - Date: 2014-06-27 07:04:35
                UPDATE