×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [adversary slide]
Home >
adversary slide
Warfare and the Evolution of Social Complexity Peter Turchin University of Connecticut talk at UC Riverside, Feb. 2009.
213 views
Toward Practical Public Key Anti- Counterfeiting for Low-Cost EPC Tags Alex Arbit, Avishai Wool, Yossi Oren, IEEE RFID April 2011 1.
214 views
1 Kerberos and X.509 Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Changed by Somesh Jha)
225 views
What we expect from Watermarking Scott Craver and Bede Liu Department of Electrical Engineering, Princeton University.
217 views
Coercive Operations and their Influence on the Equipment Programme 20 ISMOR Ben Bolland Mike Purvis.
215 views
A Security-centric Ring-based Software Architecture 1 Jay-Evan J. Tevis John A. Hamilton, Jr. Western Illinois University Auburn University Macomb, IL.
213 views
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS,
220 views
English Shellcode J. Mason, S. Small, F. Monrose, G. MacManus CCS ’09 Presented by: Eugenie Lee EE515/IS523: Security101: Think Like an Adversary.
214 views
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Haifeng Yu National University of Singapore Phillip B. Gibbons Intel Research Pittsburgh.
216 views
Software Management Technologies Needs and S&T Strategies DoD Software Engineering Science & Technology Summit August 7-9, 2001.
215 views
Security via Type Qualifiers Jeff Foster University of Maryland Joint work with Alex Aiken, Rob Johnson, John Kodumal, Tachio Terauchi, and David Wagner.
216 views
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
218 views
Next >