Attack

Results: 9771



#Item
881

Attack, solution and verification for shared authorisation data in TCG TPM Liqun Chen and Mark Ryan HP Labs, UK, and University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-09-11 10:36:45
    882

    Background on EMV A New Attack on EMV Positive Results Concluding Remarks On the Joint Security of Encryption and Signature in EMV Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart and Mario Strefl

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2012-02-29 10:40:25
      883

      TM JCAT: An environment for attack and test on Java Card Serge C HAUMETTE ∗

      Add to Reading List

      Source URL: damien.sauveron.fr

      Language: English - Date: 2013-02-26 15:54:32
        884

        The Meaning of Attack-Resistant Systems Vijay Ganesh Sebastian Banescu Mart´ın Ochoa

        Add to Reading List

        Source URL: software.imdea.org

        Language: English - Date: 2015-07-09 06:40:16
          885Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

          Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-05-20 23:58:55
          886

            [ MANAGED SECURITY SERVICES ] ANATOMY OF THE ATTACK: PHISHING

          Add to Reading List

          Source URL: www.rooksecurity.com

          Language: English - Date: 2015-01-20 15:31:50
            887

            An Empirical Analysis of the Current State of Phishing Attack and Defence Tyler Moore and Richard Clayton Computer Laboratory, University of Cambridge 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom {tyler.moore}

            Add to Reading List

            Source URL: weis07.infosecon.net

            Language: English - Date: 2013-09-01 23:27:25
              888Computer networking / Cache / Named data networking / DNS spoofing / Web cache / Content centric networking / Hypertext Transfer Protocol / Interest Flooding Attack / Forwarding plane / Probability distribution

              Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam Sungkyunkwan University

              Add to Reading List

              Source URL: conferences2.sigcomm.org

              Language: English - Date: 2015-10-01 13:11:48
              889

              Motivation RC4 in TLS Attack Setting

              Add to Reading List

              Source URL: www.usenix.org

              Language: English - Date: 2015-08-19 13:12:21
                890Denial-of-service attacks / Cyberwarfare / Computing / Domain name system / Denial-of-service attack / Internet Relay Chat / Computer security / Internet activism / Transmission Control Protocol / Computer network security / TCP reset attack / Domain Name System Security Extensions

                JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

                Add to Reading List

                Source URL: www.jpcert.or.jp

                Language: English - Date: 2015-06-29 20:52:09
                UPDATE