Security

Results: 374843



#Item
41Cryptography / Cryptographic hash functions / HMAC / MD5 / Crypt / Collision attack / Padding / SHA-2 / MerkleDamgrd construction / SHA-1 / Hash function / Length extension attack

EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
42Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-30 18:44:12
43Logic gates / Theoretical computer science / Boolean satisfiability problem / XOR gate / XNOR gate / AND gate / Data Encryption Standard / OR gate / Block cipher / Mathematical optimization / Circuit

Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:40:06
44Cryptography / National Institute of Standards and Technology / Block cipher / Advantage / Random number generation / RSA / Pseudorandom number generators / Dual EC DRBG

Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna Secure Systems Pitney Bowes Inc.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-01 07:43:52
45Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
46

The Password Reset MitM Attack Nethanel Gelernter Senia Kalma, Bar Magnezi, Hen Porcilan Cyberpion, Israel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:25
    47Government / Foreign relations of the United States / United States / Immigration policy of Donald Trump / Internal affairs ministries / United States federal executive departments / United States intelligence agencies / U.S. Immigration and Customs Enforcement / Executive Order 13769 / United States Department of Homeland Security / Donald Trump / Vetting

    The Honorable Elaine C. Duke Acting Secretary of Homeland Security Department of Homeland Security Washington, DCNovember 16, 2017 Dear Secretary Duke:

    Add to Reading List

    Source URL: www.brennancenter.org

    Language: English - Date: 2017-11-16 07:45:42
    48Computer security / Computing / World Wide Web / Hacking / Transport Layer Security / Ajax / Hypertext Transfer Protocol / Cross-origin resource sharing / Content Security Policy / HTTP cookie / Same-origin policy / HTTP Strict Transport Security

    Raising the Bar: Evaluating Origin-wide Security Manifests Steven Van Acker Daniel Hausknecht Andrei Sabelfeld

    Add to Reading List

    Source URL: danielhausknecht.eu

    Language: English - Date: 2018-09-22 05:15:36
    49

    INFORMATION Dear Customer, Please be informed that in view for increasing the safety of card use abroad, as of 19 January 2016 the Bank enters new security requirements in force. If you travel to a country outside of Eu

    Add to Reading List

    Source URL: www.raiffeisen.hu

      50Mobile technology / Technology / Information and communications technology / Mobile telecommunications / Computer network security / Femtocell / Wi-Fi / Anomaly detection / GSM / Generic Access Network / SMS / Network security

      SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

      Add to Reading List

      Source URL: mavroud.is

      Language: English - Date: 2018-10-23 09:34:50
      UPDATE