Security analysis

Results: 6956



#Item
401

Security Analysis of an Open Car Immobilizer Protocol Stack 4th International Conference on Trusted Systems (InTrustDecember 17-18, Egham, UK Stefan Tillich and Marcin Wójcik

Add to Reading List

Source URL: www.intrust2012.com

Language: English - Date: 2013-01-09 03:57:00
    402Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

    1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    403Military / International relations / International Security Assistance Force / AfghanistanUnited States relations / War in Afghanistan / Joint Analysis and Lessons Learned Centre / NATO

    PROTECTION OF CIVILIANS HOW ISAF REDUCED CIVILIAN CASUALTIES Report Published on 01 JunePROJECT FACTSHEET

    Add to Reading List

    Source URL: www.jallc.nato.int

    Language: English - Date: 2015-10-02 10:24:10
    404

    An Economic Analysis of the Strategic Interaction among Computer Security Attackers Pei-yu Chen, Gaurav Kataria and Ramayya Krishnan Carnegie Mellon University Abstract: It is commonly assumed that there are only two kin

    Add to Reading List

    Source URL: ebusiness.mit.edu

    Language: English - Date: 2006-09-09 12:11:22
      405

      An Economic Analysis of the Strategic Interaction among Computer Security Attackers Pei-yu Chen, Gaurav Kataria and Ramayya Krishnan Carnegie Mellon University Abstract: It is commonly assumed that there are only two kin

      Add to Reading List

      Source URL: digital.mit.edu

      Language: English - Date: 2006-09-09 12:11:22
        406Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

        Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

        Add to Reading List

        Source URL: www.vanbever.eu

        Language: English - Date: 2014-10-08 09:38:20
        407

        Analysis of ecrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer Vaibhav Garg, Chris Kanich, L. Jean Camp Abstract Research in the economics of security has contributed more than a decade of empirical fi

        Add to Reading List

        Source URL: cryptosec.ucsd.edu

        Language: English - Date: 2012-08-09 18:17:38
          408Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

          Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-05-20 23:58:55
          409Military / Military units and formations of NATO / AfghanistanUnited States relations / International Security Assistance Force / Allied Command Transformation / Joint Analysis and Lessons Learned Centre / NATO / Joint Task Force / War in Afghanistan

          COUNTER- AND ANTI-CORRUPTION THEORY AND PRACTICE FROM NATO OPERATIONS Report Published on 10 May 2013 PROJECT OVERVIEW

          Add to Reading List

          Source URL: www.jallc.nato.int

          Language: English - Date: 2015-10-02 10:23:45
          410

          Security Analysis of the Native Code in Sun’s JDK Jason Croft Gang Tan Department of Computer Science, Boston College

          Add to Reading List

          Source URL: www.jasoncroft.info

          Language: English - Date: 2009-11-25 11:47:20
            UPDATE