Man-in-the-middle attack

Results: 286



#Item
31An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:17:52
32CS 161  Computer Security Spring 2010

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-04-03 00:22:05
33SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2015-04-11 10:28:11
34JuneHappy June, MINI5280! IN THIS ISSUE New Members

JuneHappy June, MINI5280! IN THIS ISSUE New Members

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2013-09-20 06:52:04
35Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract  Despite its critical importance, secure key veri

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2015-04-10 15:07:29
36

PDF Document

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2014-03-30 21:01:49
37SeptemberMINI Greetings, MINI5280! IN THIS ISSUE

SeptemberMINI Greetings, MINI5280! IN THIS ISSUE

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2013-09-20 06:52:27
38On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
39JulyHappy July, MINI5280! With this warm weather comes lots of new MINI events and recollections of those recently passed. Just last month some

JulyHappy July, MINI5280! With this warm weather comes lots of new MINI events and recollections of those recently passed. Just last month some

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2013-09-20 06:52:15
40Relativistic quantum cryptography Jed Kaniewski Centre for Quantum Technologies, NUS QuTech, TU Delft  23 March 2015

Relativistic quantum cryptography Jed Kaniewski Centre for Quantum Technologies, NUS QuTech, TU Delft 23 March 2015

Add to Reading List

Source URL: www.pcqc.fr

Language: English - Date: 2015-03-25 23:25:36