Security through obscurity

Results: 21



#Item
1Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi   Jason I. Hong

Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2018-08-02 14:42:46
    2Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi   Jason I. Hong

    Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    - Date: 2016-12-11 19:02:53
      3BLACKHAT USA 2006 – Dynamics of Insecurity  The speed of (in)security Analysis of the speed of security vs insecurity BlackHat 2006 USA – Las Vegas Stefan Frei + Martin May

      BLACKHAT USA 2006 – Dynamics of Insecurity The speed of (in)security Analysis of the speed of security vs insecurity BlackHat 2006 USA – Las Vegas Stefan Frei + Martin May

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2014-12-16 19:06:36
      4A Learning-Based Approach to Reactive Security

      A Learning-Based Approach to Reactive Security

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2010-03-09 17:35:23
      5Legal Risks of Vulnerability Disclosure  Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society

      Legal Risks of Vulnerability Disclosure Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2014-12-16 19:06:21
      6Ethics Inf Technol:53–64 DOIs10676Explanation and trust: what to tell the user in security and AI? Wolter Pieters

      Ethics Inf Technol:53–64 DOIs10676Explanation and trust: what to tell the user in security and AI? Wolter Pieters

      Add to Reading List

      Source URL: eprints.eemcs.utwente.nl

      Language: English - Date: 2011-02-24 12:53:13
      7Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS  Georgia SoftWorks

      Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS Georgia SoftWorks

      Add to Reading List

      Source URL: www.georgiasoftworks.com

      Language: English - Date: 2012-11-21 13:26:32
      8Computer network security / National security / Cryptography / Crime prevention / Software testing / Security through obscurity / Vulnerability / Right to Information Act / Proprietary software / Security / Computer security / Cyberwarfare

      Microsoft Word - _4_Swire.doc

      Add to Reading List

      Source URL: www.houstonlawreview.org

      Language: English - Date: 2006-04-22 01:37:55
      9Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was

      Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was

      Add to Reading List

      Source URL: votingsystems.cdn.sos.ca.gov

      Language: English - Date: 2014-12-02 18:18:58
      10Microsoft Word - Red_Overview-after2.doc

      Microsoft Word - Red_Overview-after2.doc

      Add to Reading List

      Source URL: votingsystems.cdn.sos.ca.gov

      Language: English - Date: 2014-12-09 18:46:52