1![Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong](https://www.pdfsearch.io/img/eb2028c48e9732b2973591e5f0318fe1.jpg) | Add to Reading ListSource URL: www.andrew.cmu.eduLanguage: English - Date: 2018-08-02 14:42:46
|
---|
2![Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong](https://www.pdfsearch.io/img/41e85f1e86bcaff3f795eb292a87c77b.jpg) | Add to Reading ListSource URL: www.andrew.cmu.edu- Date: 2016-12-11 19:02:53
|
---|
3![BLACKHAT USA 2006 – Dynamics of Insecurity The speed of (in)security Analysis of the speed of security vs insecurity BlackHat 2006 USA – Las Vegas Stefan Frei + Martin May BLACKHAT USA 2006 – Dynamics of Insecurity The speed of (in)security Analysis of the speed of security vs insecurity BlackHat 2006 USA – Las Vegas Stefan Frei + Martin May](https://www.pdfsearch.io/img/b34147267db4d6bec964c27355966f92.jpg) | Add to Reading ListSource URL: www.blackhat.comLanguage: English - Date: 2014-12-16 19:06:36
|
---|
4![A Learning-Based Approach to Reactive Security A Learning-Based Approach to Reactive Security](https://www.pdfsearch.io/img/f996c8aa60fd1f8dc281d0b8cd878928.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2010-03-09 17:35:23
|
---|
5![Legal Risks of Vulnerability Disclosure Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society Legal Risks of Vulnerability Disclosure Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society](https://www.pdfsearch.io/img/a2e0928d6db2b4accd582ebb6e6545b4.jpg) | Add to Reading ListSource URL: www.blackhat.comLanguage: English - Date: 2014-12-16 19:06:21
|
---|
6![Ethics Inf Technol:53–64 DOIs10676Explanation and trust: what to tell the user in security and AI? Wolter Pieters Ethics Inf Technol:53–64 DOIs10676Explanation and trust: what to tell the user in security and AI? Wolter Pieters](https://www.pdfsearch.io/img/051efb559ab3f06d9a7a072803a99374.jpg) | Add to Reading ListSource URL: eprints.eemcs.utwente.nlLanguage: English - Date: 2011-02-24 12:53:13
|
---|
7![Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS Georgia SoftWorks Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS Georgia SoftWorks](https://www.pdfsearch.io/img/aebb69fa6732f8f14f24ca176dafbdfd.jpg) | Add to Reading ListSource URL: www.georgiasoftworks.comLanguage: English - Date: 2012-11-21 13:26:32
|
---|
8![Computer network security / National security / Cryptography / Crime prevention / Software testing / Security through obscurity / Vulnerability / Right to Information Act / Proprietary software / Security / Computer security / Cyberwarfare Computer network security / National security / Cryptography / Crime prevention / Software testing / Security through obscurity / Vulnerability / Right to Information Act / Proprietary software / Security / Computer security / Cyberwarfare](/pdf-icon.png) | Add to Reading ListSource URL: www.houstonlawreview.orgLanguage: English - Date: 2006-04-22 01:37:55
|
---|
9![Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was](https://www.pdfsearch.io/img/01557325fa4d498b2cb5b4e6a68ad0fe.jpg) | Add to Reading ListSource URL: votingsystems.cdn.sos.ca.govLanguage: English - Date: 2014-12-02 18:18:58
|
---|
10![Microsoft Word - Red_Overview-after2.doc Microsoft Word - Red_Overview-after2.doc](https://www.pdfsearch.io/img/92485cd7806d41cd33ec5a542cc56108.jpg) | Add to Reading ListSource URL: votingsystems.cdn.sos.ca.govLanguage: English - Date: 2014-12-09 18:46:52
|
---|