Attack

Results: 9771



#Item
711

The Directional Attack on Wireless Localization – or – How to Spoof Your Location with a Tin Can Kevin Bauer Damon McCoy

Add to Reading List

Source URL: damonmccoy.com

Language: English - Date: 2015-11-03 22:04:01
    712Computing / Cryptography / Secure communication / Security / Internet privacy / Crypto-anarchism / Mix network / Traffic analysis / Mixminion / Anonymous remailer / Denial-of-service attack / Len Sassaman

    Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:57
    713

    FFRI, Inc. Targeted Attack Protection Software Counters unknown threats by using heuristic detection technology specialized for

    Add to Reading List

    Source URL: www.ffri.jp

    Language: English - Date: 2015-07-09 04:57:33
      714Game theory / Cyberwarfare / Bitcoin / Denial-of-service attacks / Denial-of-service attack / Nash equilibrium / Botnet / Best response

      Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools Benjamin Johnson1 , Aron Laszka2 , Jens Grossklags3 , Marie Vasek4 and Tyler Moore4 1 2

      Add to Reading List

      Source URL: fc14.ifca.ai

      Language: English - Date: 2014-02-18 12:20:19
      715

      Defending Against an Internet-based Attack on the Physical World Simon Byers Aviel D. Rubin

      Add to Reading List

      Source URL: avirubin.com

      Language: English - Date: 2012-11-01 14:46:48
        716Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

        Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

        Add to Reading List

        Source URL: isi.jhu.edu

        Language: English - Date: 2016-03-21 17:23:50
        717

        Herding Hash Functions and the Nostradamus Attack John Kelsey1 and Tadayoshi Kohno2 1 National Institute of Standards and Technology,

        Add to Reading List

        Source URL: homes.cs.washington.edu

        Language: English - Date: 2010-01-06 01:14:49
          718Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

          WhatsApp Encryption Overview Technical white paper April 4, 2016

          Add to Reading List

          Source URL: www.whatsapp.com

          Language: English
          719Computer network security / Network management / Deep packet capture / NetFlow / Packet analyzer / Denial-of-service attack / Network monitoring

          Reclaiming Network-wide Visibility Using Ubiquitous Endsystem Monitors Evan Cooke University of Michigan Richard Mortier, Austin Donnelly, Paul Barham, Rebecca Isaacs Microsoft Research, Cambridge

          Add to Reading List

          Source URL: mor1.github.io

          Language: English - Date: 2016-01-14 10:42:37
          720

          State of Mobile App Security Apps Under Attack Research Report Special Focus on Financial, Retail/Merchant and Healthcare/ Medical Apps Volume 3 – November 2014

          Add to Reading List

          Source URL: www.arxan.co.jp

          Language: English - Date: 2015-08-25 01:35:12
            UPDATE