Security analysis

Results: 6956



#Item
441Computing / Internet privacy / Proxy / Statistical analysis / Computer security / Computer networking / Proxy servers / Computer network security / Proxy list

Ares Faculty Guide: How to add a course proxy user If you have a teaching/graduate assistant, you can add them as a course proxy user to a specific course. Doing so grants them the privilege to add, edit and delete reser

Add to Reading List

Source URL: www.library.fordham.edu

Language: English - Date: 2015-10-27 14:58:18
442Computer hardware / Computer data storage / Non-volatile memory / Computing / Computer memory / Computer storage devices / Computer storage media / Embedded Linux / YAFFS / Flash memory / Solid-state drive / Secure Digital

Security Analysis of Android Factory Resets Laurent Simon https://www.cl.cam.ac.uk/~lmrs2/

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-30 16:28:22
443

Finite-key security analysis of quantum key distribution with imperfect light sources Akihiro Mizutani∗ ,1 Marcos Curty,2 Charles Ci Wen Lim,3 Nobuyuki Imoto,1 and Kiyoshi Tamaki4 2 1 Graduate School of Engineering Sci

Add to Reading List

Source URL: 2015.qcrypt.net

Language: English - Date: 2015-09-22 01:47:01
    444Computing / Network performance / Scheduling algorithms / Computer networking / Computer network security / Denial-of-service attacks / Robust random early detection / Network scheduler / Fair queuing / Scheduling / Transmission Control Protocol / Schedule

    Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia

    Add to Reading List

    Source URL: info.iet.unipi.it

    Language: English - Date: 2012-05-25 16:00:35
    445

    Fault Sensitivity Analysis Meets Zero-Value Attack Oliver Mischke, Amir Moradi, Tim Güneysu Horst Görtz Institute for IT-Security FDTC 2014, Busan,

    Add to Reading List

    Source URL: conferenze.dei.polimi.it

    Language: English - Date: 2014-10-30 13:06:56
      446Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network

      Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

      Add to Reading List

      Source URL: vanbever.eu

      Language: English - Date: 2014-10-08 09:38:20
      447Cryptography / Cyberwarfare / Malware / Malware analysis / Encryption / Rootkit / HTTPS / Botnet / Block cipher / Advanced Encryption Standard / Cipher / Draft:Energy related security attacks

      Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

      Add to Reading List

      Source URL: www.kutter-fonds.ethz.ch

      Language: English - Date: 2010-05-16 10:46:32
      448Cross-platform software / Computer network security / Java / Computer security / MySQL / ASP.NET / Nessus / Cracking of wireless networks

      STANDARD EDITION Datasheet STANDARD EDITION AT A GLANCE A scan and analysis system for

      Add to Reading List

      Source URL: www.palamida.com

      Language: English - Date: 2015-06-17 16:42:29
      449Android / Smartphones / Alphabet Inc. / Google Play / Android version history

      Security Analysis of Anti-Theft Solutions by Android Mobile Anti-Virus Apps Laurent Simon

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-05-30 16:28:29
      450

      2009 International Conference on Availability, Reliability and Security Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones Collin Mulliner Fraunhofer Institute for Secure Information Technology (SIT) collin

      Add to Reading List

      Source URL: www.mulliner.org

      Language: English - Date: 2009-03-25 09:35:35
        UPDATE