University of Cambridge Computer Laboratory

Results: 746



#Item
151

Device Analyzer: Understanding smartphone usage Daniel T. Wagner, Andrew Rice, and Alastair R. Beresford Computer Laboratory, University of Cambridge, UK {dtw30,acr31,arb33}@cam.ac.uk Abstract. We describe Device Analyz

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-03-28 16:51:23
    152

    Security II: Cryptography Markus Kuhn Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/teaching/1314/SecurityII/

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-03-24 07:44:01
      153

      Chip and Skim: cloning EMV cards with the pre-play attack Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, Ross Anderson Computer Laboratory, University of Cambridge, UK Ab

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-21 13:48:10
        154

        Chip and Spin Ross Anderson, Mike Bond, and Steven J. Murdoch Computer Laboratory, University of Cambridge, JJ Thompson Avenue, CB3 0FD, UK {Ross.Anderson, Mike.Bond, Steven.Murdoch}@cl.cam.ac.uk

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2005-05-16 10:33:09
          155

          Scalable Inter-Vehicular Applications Jonathan J. Davies and Alastair R. Beresford Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge, CB3 0FD, UK {jjd27,arb33}@cam.ac.uk

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2007-09-12 05:17:14
            156

            Security II: Cryptography Markus Kuhn Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/teaching/1314/SecurityII/ These notes are provided as an aid for following the lectures, and are not a substitute

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            Language: English - Date: 2014-03-24 07:43:56
              157

              Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J. Murdoch Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/users/{sd410, sjm217}

              Add to Reading List

              Source URL: www.cl.cam.ac.uk

              Language: English - Date: 2007-05-22 05:58:40
                158

                Template Attacks on Different Devices Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge Abstract. Template attacks remain a most powerful side-channel techniqu

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2014-06-16 04:55:24
                  159

                  UNIVERSITY OF CAMBRIDGE COMPUTER LABORATORY First-Year Computer Science Practical Class — Week 2 This document incorporates the Guided Practical Session for this week, Week 2, which leads to Tick 2. It also incorporat

                  Add to Reading List

                  Source URL: www.cl.cam.ac.uk

                  Language: English - Date: 2011-10-12 05:54:13
                    160

                    On the security economics of electricity metering Ross Anderson and Shailendra Fuloria Cambridge University Computer Laboratory Abstract Smart grids are a hot topic, with the US administration devoting billions of dollar

                    Add to Reading List

                    Source URL: www.cl.cam.ac.uk

                    Language: English - Date: 2010-05-26 10:13:23
                      UPDATE