Security analysis

Results: 6956



#Item
31

Security Analysis of the Telegram IM Tomáš Sušánka whoami Tomáš Sušánka

Add to Reading List

Source URL: www.susanka.eu

Language: English - Date: 2017-07-28 12:07:32
    32

    Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 G´ abor Lencsea,∗, Youki Kadobayashib a Department

    Add to Reading List

    Source URL: www.hit.bme.hu

    Language: English - Date: 2018-04-20 08:10:01
      33

      FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps Majid Hatamian1? , Jetzabel Serna1 , Kai Rannenberg1 and Bodo Igler2 1 Chair of Mobile Business and Multilateral Security

      Add to Reading List

      Source URL: hatamian.net

      Language: English - Date: 2017-09-07 09:59:08
        34

        From Stack Inspection to Access Control: A Security Analysis for Libraries Fr´ed´eric Besson Microsoft Research Tomasz Blanc

        Add to Reading List

        Source URL: people.rennes.inria.fr

        Language: English - Date: 2014-09-03 04:27:27
          35

          Exercise 9 Program Analysis for System Security and Reliability ETH Z¨ urich May 14, 2018

          Add to Reading List

          Source URL: www.sri.inf.ethz.ch

          Language: English - Date: 2018-05-15 09:28:46
            36

            A Security Analysis of Amazon’s Elastic Compute Cloud Service – Long Version – Marco Balduzzi Jonas Zaddach

            Add to Reading List

            Source URL: seclab.ccs.neu.edu

            Language: English - Date: 2018-08-14 16:50:48
              37

              MPKC C ∗ Family Analysis An Updated Security Analysis of PFLASH Ryann Cartor1 & Daniel Smith-Tone1,2

              Add to Reading List

              Source URL: 2017.pqcrypto.org

              Language: English - Date: 2017-06-28 17:05:02
                38

                Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup Cynthia Kuo Jesse Walker

                Add to Reading List

                Source URL: www.usablesecurity.org

                Language: English - Date: 2007-01-22 03:06:49
                  39

                  IMPROVING SOFTWARE SECURITY WITH PRECISE STATIC AND RUNTIME ANALYSIS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

                  Add to Reading List

                  Source URL: www.doc.ic.ac.uk

                  Language: English - Date: 2017-01-10 09:15:12
                    40

                    A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2018-01-18 13:44:36
                      UPDATE