Uploads
Contact
/
Login
Upload
Search Results for 'Adversary Security'
Principles of Security
kittie-lecroy
Introduction to Provable Security Models, Adversaries, Reductions
pamella-moone
A Logic of Secure Systems with Tunable Adversary Models
faustina-dinatale
Introduction to Provable Security
faustina-dinatale
It’s Not
danika-pritchard
SAND No. 2010-2286C Sandia is a
kittie-lecroy
Onion Routing Security Analysis
yoshiko-marsland
Leakage-Resilient
tatyana-admore
Leakage-Resilient
min-jolicoeur
A Logic of Secure Systems and its Application to Trusted Co
tatiana-dople
Users Get Routed: Traffic Correlation on Tor by Realistic A
phoebe-click
15 Nov 2012
yoshiko-marsland
How Secure is Your Business?
yoshiko-marsland
Reduction-Resilient Cryptography:
faustina-dinatale
Reduction-Resilient Cryptography:
yoshiko-marsland
Cryptography and Network Security
alexa-scheidler
Introduction to Computer Security
karlyn-bohler
Introduction to Computer Security
marina-yarberry
Analyzing Anonymity Protocols
luanne-stotts
Quantum Security for Post-Quantum Cryptography
tawny-fly
Cryptography
phoebe-click
Security Vulnerability Assessments
stefany-barnette
Identity based
giovanna-bartolotta
Meeting the Increasingly Complex
conchita-marotz
1
2
3
4
5
6