University of Cambridge Computer Laboratory

Results: 746



#Item
591Xen / Ian Pratt / Paravirtualization / Citrix Systems / Hyper-V / System software / Software / University of Cambridge Computer Laboratory

[removed]Welcome Home: Xen moves to a new home built by CloudAccess.net – blog.xen.org Skip to content

Add to Reading List

Source URL: www.cloudaccess.net

Language: English - Date: 2014-02-14 04:03:34
592Psychometrics / Holism / Source code / Subroutine / University of Cambridge Computer Laboratory / Attribute / HTML element / Dependent and independent variables / Sampling / Computing / Statistics / Software engineering

Middle School New Field Study Item Template Middle School New Field Study Item Template Middle School New Field Study Item Template Middle School New Field Study Item Template

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2013-11-12 19:22:17
593Virtual memory / University of Cambridge Computer Laboratory / Xen / Hyper-V / Rootkit / Hypervisor / Virtualization / Hardware virtualization / Device file / System software / Software / Virtual machines

1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 14:10:31
594Radio navigation / Satellite navigation systems / Avionics / Global Positioning System / GPS signals / LORAN / Radio / Antenna / Satellite navigation / Technology / GPS / Navigation

An Asymmetric Security Mechanism for Navigation Signals Markus G. Kuhn University of Cambridge, Computer Laboratory, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom http://www.cl.cam.ac.uk/~mgk25/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2004-11-21 14:34:04
595Complex systems theory / Peer-to-peer / Computer network / Social peer-to-peer processes / Topology / Communications protocol / Information security / Information / Electronics / Data

Countering Hidden-Action Attacks on Networked Systems Tyler Moore University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom [removed]

Add to Reading List

Source URL: infosecon.net

Language: English - Date: 2006-03-16 20:15:32
596Computing / Cybercrime / Domain name system / Email / Phishing / Rock Phish / Email spam / Fast flux / Domain name / Spamming / Internet / Social engineering

An Empirical Analysis of the Current State of Phishing Attack and Defence Tyler Moore and Richard Clayton Computer Laboratory, University of Cambridge 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom {tyler.moore}

Add to Reading List

Source URL: weis2007.econinfosec.org

Language: English - Date: 2007-05-11 22:55:00
597Notation / Unicode / Digital typography / Typography / Universal Character Set / ISO/IEC / Omega / TeX / Character / Character encoding / Character sets / OSI protocols

Omega — why Bother with Unicode? Robin Fairbairns University of Cambridge Computer Laboratory Pembroke Street Cambridge CB2 3QG UK

Add to Reading List

Source URL: tug.org

Language: English - Date: 1998-03-13 10:17:00
598First-price sealed-bid auction / Auction / Vulnerability / Reverse auction / Software bug / Dutch auction / Auction theory / Auctioneering / Business

Bug Auctions: Vulnerability Markets Reconsidered Andy Ozment Computer Laboratory University of Cambridge [removed]

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:31:00
599Distributed hash table / File sharing / Peer-to-peer / Concurrent computing / Freenet / Node / Computing / Distributed data storage / Software

The Economics of Censorship Resistance George Danezis and Ross Anderson University of Cambridge, Computer Laboratory, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom. (George.Danezis, Ross.Anderson)@cl.cam.ac.uk

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:30:59
600Cryptographic protocols / Distance-bounding protocol / Complexity classes / Challenge-response authentication / IP / Transmission time / NP / Transmission Control Protocol / Network packet / Theoretical computer science / Information / Data

83 So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore Computer Laboratory, University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-10-27 15:37:45
UPDATE