Security analysis

Results: 6956



#Item
461Domain name system / Computing / Internet / Network architecture / Domain Name System Security Extensions / Name server / Root name server / PowerDNS / OpenDNS / Reverse DNS lookup / DNS root zone / Domain name

Master in System and Network Engineering Analysis of DNS Resolver Performance Measurements Supervisors: Yuri Schaeffer

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2015-08-24 06:37:35
462

A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu Abstract. We provide the first provable-secu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-17 19:30:26
    463

    Combining Theory Generation and Model Checking for Security Protocol Analysis Nicholas J. Hopper Sanjit A. Seshia January 2000

    Add to Reading List

    Source URL: reports-archive.adm.cs.cmu.edu

    Language: English - Date: 2000-02-21 17:21:30
      464Computing / Software / System software / Computer network security / Parallel computing / Intrusion detection systems / Computer security / Deep packet inspection / Network processor / Internet protocol suite / Bro / Transmission Control Protocol

      Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:02
      465

      2009 International Conference on Availability, Reliability and Security Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones Collin Mulliner Fraunhofer Institute for Secure Information Technology (SIT) collin

      Add to Reading List

      Source URL: www.mulliner.org

      Language: English - Date: 2009-03-25 09:35:35
        466Cryptography / Tokenization / Software engineering / Computer programming / Computing / Lexical analysis / Token / Search engine indexing / Security token / Payment processor / Payment card number / Naming convention

        Guideline: Tokenization Product Security Guidelines Version: 1.0 Date:

        Add to Reading List

        Source URL: www.pcisecuritystandards.org

        Language: English - Date: 2015-04-02 02:17:56
        467

        Side-Channel Analysis Marc Joye Francis Olivier Gemplus, Card Security Group, France

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:43:42
          468Computing / Computer hardware / Technology / Smart cards / Centrifuges / Home automation / Laundry / Washing machine / Cash machine / Card reader / Maytag / USB

          Laundry Laundering: A Security Analysis of Laundromat Washing Machines at the University of Michigan Eric Wustrow, Jahan Khanna University of Michigan {ewust,jahan}@umich.edu Abstract

          Add to Reading List

          Source URL: ericw.us

          Language: English - Date: 2011-01-29 05:43:59
          469

          EXECUTIVE SUMMARY This LRA Crisis Tracker Annual Security Brief provides a summary and analysis of the reported activities of the Lord’s Resistance Army (LRA) from January - December 2011 in Democratic Republic of Cong

          Add to Reading List

          Source URL: reports.lracrisistracker.com

          Language: English - Date: 2015-06-21 23:37:15
            470

            An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher Rodolphe Lampe1 , Jacques Patarin1 , and Yannick Seurin2 1 University of Versailles, France

            Add to Reading List

            Source URL: www.prism.uvsq.fr

            Language: English - Date: 2015-04-03 07:32:23
              UPDATE