Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

kw.\*:("Ataque informática")

Filtre

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Type de document [dt]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Année de publication [py]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Langue

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 1275

  • Page / 51
Export

Sélection :

  • et

Pointer Tainting Still Pointless (but we all see the point of tainting)SLOWINSKA, Asia; BOS, Herbert.Operating systems review. 2010, Vol 44, Num 3, pp 88-92, issn 0163-5980, 5 p.Article

Cybercrime 2.0 : When the Cloud Turns DarkPROVOS, Niels; MOHEEB ABU RAJAB; MAVROMMATIS, Panayiotis et al.Communications of the ACM. 2009, Vol 52, Num 4, pp 42-47, issn 0001-0782, 6 p.Article

3 : Les menaces qui pèsent sur Internet : Web 3.0 L'Avenir d'InternetLa Recherche (Imprimé). 2007, Num 413, pp 40-41, issn 0029-5671, 2 p.Article

Efficient collision search attacks on SHA-OXIAOYUN WANG; HONGBO YU; YIN, Yiqun Lisa et al.Lecture notes in computer science. 2005, pp 1-16, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 16 p.Conference Paper

Antiphishing through Phishing Target DiscoveryLIU WENYIN; GANG LIU; BITE QIU et al.IEEE internet computing. 2012, Vol 16, Num 2, pp 52-60, issn 1089-7801, 9 p.Article

Protect your library's computersZIMERMAN, Martin.New library world. 2010, Vol 111, Num 1272-3, pp 203-212, issn 0307-4803, 10 p.Article

On the Collision Resistance of RIPEMD-160MENDEL, Florian; PRAMSTALLER, Norbert; RECHBERGER, Christian et al.Lecture notes in computer science. 2006, pp 101-116, issn 0302-9743, isbn 3-540-38341-7, 1Vol, 16 p.Conference Paper

Collisions of SHA-0 and reduced SHA-1BIHAM, Eli; RAFI CHEN; JOUX, Antoine et al.Lecture notes in computer science. 2005, pp 36-57, issn 0302-9743, isbn 3-540-25910-4, 22 p.Conference Paper

Viewpoint Cyber-victimization and Cybersecurity in ChinaKSHETRI, Nir.Communications of the ACM. 2013, Vol 56, Num 4, pp 35-37, issn 0001-0782, 3 p.Article

The State of Phishing AttacksJASON HONG.Communications of the ACM. 2012, Vol 55, Num 1, pp 74-81, issn 0001-0782, 8 p.Article

Finding collisions in the full SHA-1XIAOYUN WANG; YIN, Yiqun Lisa; HONGBO YU et al.Lecture notes in computer science. 2005, pp 17-36, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 20 p.Conference Paper

Defender personality traitsWHALEN, Tara; GATES, Carrie.Lecture notes in computer science. 2006, pp 85-90, issn 0302-9743, isbn 3-540-33361-4, 1Vol, 6 p.Conference Paper

Improving the Dynamic ID-Based Remote Mutual Authentication SchemeYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 499-507, issn 0302-9743, isbn 3-540-48269-5, 9 p.Conference Paper

Multi-block collisions in hash functions based on 3C and 3C+ enhancements of the merkle-damgard constructionJOOCAK, Daniel; TUMA, Jiri.Lecture notes in computer science. 2006, pp 257-266, issn 0302-9743, isbn 3-540-49112-0, 1Vol, 10 p.Conference Paper

Canaux cachés = Hidden channelsRAYNAL, Frédéric.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num H5860, pp H5860.1-H5860.10Article

Targeted Cyberattacks: A Superset of Advanced Persistent ThreatsSOOD, Aditya K; ENBODY, Richard J.IEEE security & privacy. 2013, Vol 11, Num 1, pp 54-61, issn 1540-7993, 8 p.Article

Social phishingJAGATIC, Tom N; JOHNSON, Nathaniel A; JAKOBSSON, Markus et al.Communications of the ACM. 2007, Vol 50, Num 10, pp 94-100, issn 0001-0782, 7 p.Article

Collisions and Near-Collisions for Reduced-Round TigerKELSEY, John; LUCKS, Stefan.Lecture notes in computer science. 2006, pp 111-125, issn 0302-9743, isbn 3-540-36597-4, 1Vol, 15 p.Conference Paper

Key Substitution Attacks on Multisignature Schemes : Cryptography and Information SecurityBENNIAN DOU; HONG ZHANG; CHEN, Chun-Hua et al.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 244-245, issn 0916-8508, 2 p.Article

US Government Computer Penetration Programs and the Implications for CyberwarHUNT, Edward.IEEE Annals of the history of computing. 2012, Vol 34, Num 3, pp 4-21, issn 1058-6180, 18 p.Article

Cryptanalysis of the Full HAVAL with 4 and 5 PassesHONGBO YU; XIAOYUN WANG; YUN, Aaram et al.Lecture notes in computer science. 2006, pp 89-110, issn 0302-9743, isbn 3-540-36597-4, 1Vol, 22 p.Conference Paper

New applications of time memory data tradeoffsJIN HONG; SARKAR, Palash.Lecture notes in computer science. 2005, pp 353-372, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 20 p.Conference Paper

Genetic algorithm parameter optimization: applied to sensor coverageSAHIN, Ferat; ABBATE, Giuseppe.SPIE proceedings series. 2004, pp 157-168, isbn 0-8194-5363-3, 12 p.Conference Paper

Analysis of a Man-in-the-Middle Experiment with WiresharkCHIU, Ming-Hsing; YANG, Kuo-Pao; MEYER, Randall et al.Security & management. International conferenceWorldComp'2011. 2011, pp 461-464, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 4 p.Conference Paper

Internet Banking: Client-Side Attacks and Protection MechanismsOPPLIGER, Rolf; RYTZ, Ruedi; HOLDEREGGER, Thomas et al.Computer (Long Beach, CA). 2009, Vol 42, Num 6, pp 27-33, issn 0018-9162, 7 p.Article

  • Page / 51