×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [covert channel]
Home >
covert channel
Conscript Your Friends into Larger Anonymity Sets with JavaScript ACM Workshop on Privacy in the Electronic Society 4 November 2013 Henry Corrigan-Gibbs.
215 views
State of endpoint risk v3
326 views
CONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan Kuskos
11 views
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
626 views
BY Muhammad Kazim SUPERVISOR: Dr. Awais Shibli. Introduction Literature Survey Problem Statement OpenStack Proposed Solution and Design Major.
218 views
Practical Timing Side Channel Attacks Against Kernel Space ASLR Fall 2014 Instructor: Kun Sun, Ph.D.
216 views
A. Haeberlen Differential Privacy Under Fire 1 USENIX Security (August 12, 2011) Andreas Haeberlen Benjamin C. Pierce Arjun Narayan University of Pennsylvania.
215 views
Conclusion 1 Conclusion Conclusion 2 Course Summary Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis Access.
237 views
Anonymization and Privacy Services Infranet: Circumventing Web Censorship and Surveillance, Feamster et al, Usenix Security Symposium 2002.
217 views
AFOSR PROGRAM REVIEW JUNE 5-7, 2003 PRINCETON, NJ DATA HIDING IN TIME-FREQUENCY DISTRIBUTION OF IMAGES Bijan Mobasseri ECE Department Villanova University.
217 views
Hey, You, get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
16 views
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology
32 views
< Previous
Next >