Obfuscation

Results: 1117



#Item
321

Location Privacy Protection Through Obfuscation-based Techniques C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati Dipartimento di Tecnologie dell’Informazione Universit`

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:50:00
    322

    On the Effectiveness of Obfuscation Techniques in Online Social Networks Terence Chen1,2 , Roksana Boreli1,2 , Mohamed-Ali Kaafar1,2,3 , and Arik Friedman1,2 1

    Add to Reading List

    Source URL: www.petsymposium.org

    Language: English - Date: 2014-06-27 07:04:35
      323Obfuscation / Index of standards articles / Standards / Index of Abkhazia-related articles

      (illusions) Your Twisted Little Mind Illusions that distort your perception By Stephen L. Macknik and Susana Martinez-Conde

      Add to Reading List

      Source URL: smc.neuralcorrelate.com

      Language: English - Date: 2016-01-16 23:02:16
      324Computer access control / Obfuscation / Cryptography / Computer security / Password / Passphrase / Salt / Password psychology / Password fatigue

      SYSADMIN Helping Users Create Better Passwords B L A S E U R , PAT R I C K G A G E K E L L E Y, S A R A N G A K O M A N D U R I , J O E L L E E , M I C H A E L M A A S S , M I C H E L L E L . M A Z U R E K , T I M OT H

      Add to Reading List

      Source URL: patrickgagekelley.com

      Language: English - Date: 2013-05-01 19:52:01
      325Cryptography / Computing / Internet / Keyword cipher / Password / Obfuscation / Transport Layer Security / Four-square cipher / Classical cipher

      AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps Fangda Cai, Hao Chen Yuanyi Wu

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-05-20 23:58:56
      326

      Marionette: A Programmable Network-Traffic Obfuscation System Kevin P. Dyer Portland State University Scott E. Coull

      Add to Reading List

      Source URL: www.scottcoull.com

      Language: English - Date: 2015-07-28 09:54:07
        327Mathematics / Field theory / Limit of a function / Mathematical analysis / Expected value / Valuation / Flow / Obfuscation / Word square

        Model Checking Invariant Security Properties in OpenFlow Sooel Son University of Texas at Austin Seungwon Shin Vinod Yegneswaran

        Add to Reading List

        Source URL: faculty.cs.tamu.edu

        Language: English - Date: 2013-03-01 17:46:34
        328Judicial branch of the United States government / Online law databases / Obfuscation / Prevention / Password / Security / PACER / Government / CM/ECF / The Pacer

        Quarterly Announcements July 2012 www.pacer.gov NEW! Firm Billing Now Available Many firms appreciate the convenience and security provided by opening individual PACER accounts for their employees,

        Add to Reading List

        Source URL: www.pacer.gov

        Language: English - Date: 2012-07-10 08:23:33
        329Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

        Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

        Add to Reading List

        Source URL: www.guanotronic.com

        Language: English - Date: 2011-01-14 11:12:10
        330

        Marionette: A Programmable Network Traffic Obfuscation System Kevin P. Dyer, Portland State University; Scott E. Coull, RedJack LLC.; Thomas Shrimpton, Portland State University https://www.usenix.org/conference/usenixse

        Add to Reading List

        Source URL: www.usenix.org

        Language: English
          UPDATE