Vector Security

Results: 220



#Item
211Author manuscript, published in

Author manuscript, published in "Fault Diagnosis and Tolerance in Cryptography, Santa Barbara : United States (2010)" DOI : [removed]FDTC[removed]

Add to Reading List

Source URL: hal.archives-ouvertes.fr

Language: English - Date: 2010-11-11 06:25:51
212Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:45:01
213SECURITY  THROUGH OBSCURITY

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
214

PDF Document

Add to Reading List

Source URL: n-pn.info

Language: English - Date: 2011-11-21 22:49:00
215steal.dvi

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
216

PDF Document

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
217

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-11-23 10:33:55
218

PDF Document

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:18:36
219

PDF Document

Add to Reading List

Source URL: axon.cs.byu.edu

Language: English - Date: 2011-04-19 15:46:19
220

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-09-16 14:46:25