Back to Results
First PageMeta Content
Cyberwarfare / Software testing / Hacking / Crime prevention / National security / Exploit / Vulnerability / Malware / Threat / Computer security / Computer network security / Computing


OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research
Add to Reading List

Document Date: 2014-09-11 05:58:33


Open Document

File Size: 168,57 KB

Share Result on Facebook

City

Fairfax / Oxfordshire / Buenos Aires / /

Company

Minnesota Law Review / Anderson / Needham / Core Security Technologies / BBN Technologies / /

Country

Germany / United States / United Kingdom / Argentina / /

/

Event

Person Travel / /

Facility

University of Calgary / Northeastern University / Columbia University / The College of New Jersey / Dartmouth College / /

IndustryTerm

intrusion software / backed software product / software construction / software engineering / enough computing systems / public commodity communications / basic tools / software construction methods / telecommunications industry / certain cryptographic algorithms / portal operator / Web portal / natural language processing research / everyday computing / software vulnerability / trustworthy systems / cryptographic protocols / open source research tool / power management / trusted computing systems / dual use technology subject / communication protocols / computing systems / computing / type systems / adversarial audit / network capable device / offensive computing / /

OperatingSystem

Microsoft Windows / /

Organization

Columbia University / Northeastern University / US government / Yale / IEEE / Federal Bureau of Investigation / Dartmouth College / Computer Science Department / College of New Jersey / Board of Governors / University of Calgary / Politecnico di Milano / Computer Society / /

Person

Phil Zimmerman / Sergey Bratus / Robert Graham / Paul N. Stockton / Johnny Can / Gerardo Richarte / Manuel Sadosky / Michele Golabek-Goldman / Iván Arce / John Lambert / Michael E. Locasto / /

Position

CTO / co-founder / legislator / researcher / author / research associate professor / research associate professor of computer science / assistant professor / director of security / protocol designer / judge / Special Agent / programmer / senior member / co-founder and former CTO / /

ProgrammingLanguage

R / C / php / L / /

ProvinceOrState

New Jersey / Virginia / /

PublishedMedium

Minnesota Law Review / Policy Review / /

Technology

backdoored-by-design Clipper chip / alpha / certain cryptographic algorithms / pdf / encryption / cryptography / natural language processing / firewall / http / communication protocols / /

URL

http /

SocialTag