Security analysis

Results: 6956



#Item
471

Correlation Power Analysis with a Leakage Model Eric Brier, Christophe Clavier, and Francis Olivier Gemplus Card International, France Security Technology Department {eric.brier, christophe.clavier, francis.olivier}@gemp

Add to Reading List

Source URL: www.ecole.ensicaen.fr

Language: English
    472

    2008 Annual Computer Security Applications Conference Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection∗ Peng Li University of North Carolina at Chapel Hill

    Add to Reading List

    Source URL: flyer.sis.smu.edu.sg

    Language: English - Date: 2014-12-17 01:40:50
      473

      CASE STUDY Pacific training course in analysis of economic impacts of invasive species Background Invasive species present serious threats to biodiversity, livelihoods, food security and human health. Their impacts are e

      Add to Reading List

      Source URL: www.isinz.com

      Language: English - Date: 2012-07-02 17:53:52
        474Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

        Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

        Add to Reading List

        Source URL: seclab.stanford.edu

        Language: English - Date: 2010-07-17 01:14:15
        475Cryptography / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Certificate authority / Root certificate / Public key certificate / HTTPS / DigiNotar

        Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan

        Add to Reading List

        Source URL: zakird.com

        Language: English
        476Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

        Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

        Add to Reading List

        Source URL: www0.cs.ucl.ac.uk

        Language: English - Date: 2013-10-10 06:49:00
        477

        Multi-GPU Computing for Achieving Speedup in Real-time Aggregate Risk Analysis A. K. Bahl Center for Security, Theory and Algorithmic Research International Institute of Information Technology Hyderabad, India aman.kumar

        Add to Reading List

        Source URL: web.cs.dal.ca

        Language: English - Date: 2013-11-04 16:38:20
          478

          Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols Max Kanovich1,5 Tajana Ban Kirigin2 Vivek Nigam3 Andre Scedrov4,5 and Carolyn Talcott6 1

          Add to Reading List

          Source URL: www.nigam.info

          Language: English - Date: 2015-03-22 10:55:44
            479

            Press Release VDC Research Announces Next Iteration of Security & the Internet of Things Market Research Program Industry response drives third year of data collection and analysis focusing on security risks of connected

            Add to Reading List

            Source URL: www.vdcresearch.com

            Language: English
              UPDATE