Security through obscurity

Results: 21



#Item
1

Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2018-08-02 14:42:46
    2

    Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    - Date: 2016-12-11 19:02:53
      3Computer network security / Software testing / Hacking / Vulnerability / Security risk / Patch / Exploit / Security through obscurity / OSVDB / Computer security / Cyberwarfare / Security

      BLACKHAT USA 2006 – Dynamics of Insecurity The speed of (in)security Analysis of the speed of security vs insecurity BlackHat 2006 USA – Las Vegas Stefan Frei + Martin May

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2014-12-16 19:06:36
      4National security / Defence in depth / Military geography / Military strategy / Proactivity / Security through obscurity / SecurID / Attack / Force concentration / Military science / Security / Computer network security

      A Learning-Based Approach to Reactive Security

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2010-03-09 17:35:23
      5International trade / Monopoly / World Intellectual Property Organization Copyright Treaty / WIPO Performances and Phonograms Treaty / Digital Millennium Copyright Act / Copyright / Security through obscurity / Anti-circumvention / Copyright Directive / Law / 105th United States Congress / Business law

      Legal Risks of Vulnerability Disclosure Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2014-12-16 19:06:21
      6Epistemology / Electronic voting / Trust / Explanation / Expert system / Black box voting / Computer security / Security through obscurity / Voting machine / Critical thinking / Ethics / Science

      Ethics Inf Technol:53–64 DOIs10676Explanation and trust: what to tell the user in security and AI? Wolter Pieters

      Add to Reading List

      Source URL: eprints.eemcs.utwente.nl

      Language: English - Date: 2011-02-24 12:53:13
      7FIPS 140-2 / Proprietary software / Advanced Encryption Standard / Security through obscurity / Cryptographic primitive / Wireless Transport Layer Security / Cryptography / Cryptographic protocols / Secure Shell

      Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS Georgia SoftWorks

      Add to Reading List

      Source URL: www.georgiasoftworks.com

      Language: English - Date: 2012-11-21 13:26:32
      8Computer network security / National security / Cryptography / Crime prevention / Software testing / Security through obscurity / Vulnerability / Right to Information Act / Proprietary software / Security / Computer security / Cyberwarfare

      Microsoft Word - _4_Swire.doc

      Add to Reading List

      Source URL: www.houstonlawreview.org

      Language: English - Date: 2006-04-22 01:37:55
      9Information society / Election technology / Hart InterCivic / Premier Election Solutions / Vote counting system / Security through obscurity / Ballot / Politics / Electronic voting / Technology

      Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was

      Add to Reading List

      Source URL: votingsystems.cdn.sos.ca.gov

      Language: English - Date: 2014-12-02 18:18:58
      10Election fraud / Cyberwarfare / Computer network security / Information society / Software testing / Voter-verified paper audit trail / Vulnerability / Voting machine / Security through obscurity / Electronic voting / Politics / Computer security

      Microsoft Word - Red_Overview-after2.doc

      Add to Reading List

      Source URL: votingsystems.cdn.sos.ca.gov

      Language: English - Date: 2014-12-09 18:46:52
      UPDATE