×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [malicious client]
Home >
malicious client
Querying Encrypted Data using Fully Homomorphic Encryption Murali Mani, UMFlint Talk given at CIDR, Jan 7, 2013 1.
217 views
FUSE and beyond: bridging filesystems paper by Emmanuel Dreyfus
82 views
Analysis of the SILC Protocol with Murphi. Overview What is SILC? What is SILC? Stands for Secure Internet Live Conferencing. Stands for Secure Internet.
218 views
Non-tracking Web Analytics Istemi Ekin Akkus 1, Ruichuan Chen 1, Michaela Hardt 2, Paul Francis 1, Johannes Gehrke 3 1 Max Planck Institute for Software.
220 views
Building More Secure Applications Dave Glover Developer Solutions Specialist Microsoft Australia Blog: .
216 views
Network Security The security problems in the networks may be subdivided in four cathegories: - confidentiality - authenticity -non repudiation -integrity.
215 views
File systems, processes and system calls, scheduler By Team Sandbox Asaf Cohen, Yaron Rozen.
215 views
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
213 views
Analysis of the SILC Protocol with Murphi
40 views
White list Black list
69 views
Using Static Analysis for Ajax Intrusion Detection
29 views
ReIm & ReImInfer : Checking and Inference of Reference Immutability and Method Purity
41 views
Next >