1![Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu](https://www.pdfsearch.io/img/d17f8fc666096c90908c1e46de868c9e.jpg) | Add to Reading ListSource URL: lasr.cs.ucla.eduLanguage: English - Date: 2012-09-17 16:56:34
|
---|
2![GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and](https://www.pdfsearch.io/img/a27bae2061e5122ecdf03f8960b7fed0.jpg) | Add to Reading ListSource URL: mateboban.netLanguage: English - Date: 2013-07-15 15:54:45
|
---|
3![IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t](https://www.pdfsearch.io/img/a25965d229b186ce312f31690e362ed0.jpg) | Add to Reading ListSource URL: www.identrust.comLanguage: English - Date: 2014-05-01 19:01:13
|
---|
4![Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008 Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008](https://www.pdfsearch.io/img/cc547ed90ff9f70e5b89966bf333b4e0.jpg) | Add to Reading ListSource URL: we.riseup.netLanguage: English - Date: 2011-01-17 04:39:11
|
---|
5![Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT](https://www.pdfsearch.io/img/c98ad31d55f9e1833dc0f0d67b8968bc.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2005-06-21 09:58:18
|
---|
6![2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 ∗ Nik Unger∗ , Sergej Dechand† 2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 ∗ Nik Unger∗ , Sergej Dechand†](https://www.pdfsearch.io/img/26b004a63f8b6e70409d7f06f2ec2758.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2015-05-11 16:43:11
|
---|
7![Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1 Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1](https://www.pdfsearch.io/img/888c39e60b129e94619e2c19605654d3.jpg) | Add to Reading ListSource URL: www.vast.uccs.eduLanguage: English - Date: 2010-11-05 15:10:51
|
---|
8![Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1 Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1](https://www.pdfsearch.io/img/2496c3bdde0e84d81ff619c2fb2a53b6.jpg) | Add to Reading ListSource URL: vast.uccs.eduLanguage: English - Date: 2010-11-05 15:10:51
|
---|
9![Internet Banking Some InternetAnalyzing DNS Incidents SSL and users Internet Banking Some InternetAnalyzing DNS Incidents SSL and users](https://www.pdfsearch.io/img/ce8865cd5ab1fd79fe4a01877f5f2e21.jpg) | Add to Reading ListSource URL: www.rvs.uni-bielefeld.deLanguage: English - Date: 2002-12-19 11:49:33
|
---|
10![White Paper Cisco Spark Security and Privacy Version 1.0 (JuneCisco® Spark is a cloud collaboration platform that provides messaging, calling, and White Paper Cisco Spark Security and Privacy Version 1.0 (JuneCisco® Spark is a cloud collaboration platform that provides messaging, calling, and](https://www.pdfsearch.io/img/340cd4b580f3f246c26ff44645dce3bb.jpg) | Add to Reading ListSource URL: www.cisco.comLanguage: English |
---|