Sciweavers

14850 search results - page 18 / 2970
» The Security of
Sort
View
80
Voted
ISPEC
2010
Springer
15 years 8 months ago
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
Jiazhe Chen, Keting Jia
ACSAC
2009
IEEE
15 years 8 months ago
Leveraging Cellular Infrastructure to Improve Fraud Prevention
Frank S. Park, Chinmay Gangakhedkar, Patrick Trayn...
IEEEARES
2009
IEEE
15 years 8 months ago
Risk-Driven Architectural Decomposition
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
IEEEARES
2009
IEEE
15 years 8 months ago
A First Step towards Characterizing Stealthy Botnets
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu