Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

kw.\*:("Attaque informatique")

Filtre

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Type de document [dt]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Année de publication [py]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Langue

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 1312

  • Page / 53
Export

Sélection :

  • et

Pointer Tainting Still Pointless (but we all see the point of tainting)SLOWINSKA, Asia; BOS, Herbert.Operating systems review. 2010, Vol 44, Num 3, pp 88-92, issn 0163-5980, 5 p.Article

Antiphishing through Phishing Target DiscoveryLIU WENYIN; GANG LIU; BITE QIU et al.IEEE internet computing. 2012, Vol 16, Num 2, pp 52-60, issn 1089-7801, 9 p.Article

Cybercrime 2.0 : When the Cloud Turns DarkPROVOS, Niels; MOHEEB ABU RAJAB; MAVROMMATIS, Panayiotis et al.Communications of the ACM. 2009, Vol 52, Num 4, pp 42-47, issn 0001-0782, 6 p.Article

3 : Les menaces qui pèsent sur Internet : Web 3.0 L'Avenir d'InternetLa Recherche (Imprimé). 2007, Num 413, pp 40-41, issn 0029-5671, 2 p.Article

Efficient collision search attacks on SHA-OXIAOYUN WANG; HONGBO YU; YIN, Yiqun Lisa et al.Lecture notes in computer science. 2005, pp 1-16, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 16 p.Conference Paper

On the Collision Resistance of RIPEMD-160MENDEL, Florian; PRAMSTALLER, Norbert; RECHBERGER, Christian et al.Lecture notes in computer science. 2006, pp 101-116, issn 0302-9743, isbn 3-540-38341-7, 1Vol, 16 p.Conference Paper

Collisions of SHA-0 and reduced SHA-1BIHAM, Eli; RAFI CHEN; JOUX, Antoine et al.Lecture notes in computer science. 2005, pp 36-57, issn 0302-9743, isbn 3-540-25910-4, 22 p.Conference Paper

The State of Phishing AttacksJASON HONG.Communications of the ACM. 2012, Vol 55, Num 1, pp 74-81, issn 0001-0782, 8 p.Article

Finding collisions in the full SHA-1XIAOYUN WANG; YIN, Yiqun Lisa; HONGBO YU et al.Lecture notes in computer science. 2005, pp 17-36, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 20 p.Conference Paper

Viewpoint Cyber-victimization and Cybersecurity in ChinaKSHETRI, Nir.Communications of the ACM. 2013, Vol 56, Num 4, pp 35-37, issn 0001-0782, 3 p.Article

Protect your library's computersZIMERMAN, Martin.New library world. 2010, Vol 111, Num 1272-3, pp 203-212, issn 0307-4803, 10 p.Article

Key Substitution Attacks on Multisignature Schemes : Cryptography and Information SecurityBENNIAN DOU; HONG ZHANG; CHEN, Chun-Hua et al.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 244-245, issn 0916-8508, 2 p.Article

US Government Computer Penetration Programs and the Implications for CyberwarHUNT, Edward.IEEE Annals of the history of computing. 2012, Vol 34, Num 3, pp 4-21, issn 1058-6180, 18 p.Article

Elliptic curve cryptography engineeringCILARDO, Alessandro; COPPOLINO, Luigi; MAZZOCCA, Nicola et al.Proceedings of the IEEE. 2006, Vol 94, Num 2, pp 395-406, issn 0018-9219, 12 p.Article

Cryptanalysis of the Full HAVAL with 4 and 5 PassesHONGBO YU; XIAOYUN WANG; YUN, Aaram et al.Lecture notes in computer science. 2006, pp 89-110, issn 0302-9743, isbn 3-540-36597-4, 1Vol, 22 p.Conference Paper

New applications of time memory data tradeoffsJIN HONG; SARKAR, Palash.Lecture notes in computer science. 2005, pp 353-372, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 20 p.Conference Paper

Genetic algorithm parameter optimization: applied to sensor coverageSAHIN, Ferat; ABBATE, Giuseppe.SPIE proceedings series. 2004, pp 157-168, isbn 0-8194-5363-3, 12 p.Conference Paper

Analysis of a Man-in-the-Middle Experiment with WiresharkCHIU, Ming-Hsing; YANG, Kuo-Pao; MEYER, Randall et al.Security & management. International conferenceWorldComp'2011. 2011, pp 461-464, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 4 p.Conference Paper

Internet Banking: Client-Side Attacks and Protection MechanismsOPPLIGER, Rolf; RYTZ, Ruedi; HOLDEREGGER, Thomas et al.Computer (Long Beach, CA). 2009, Vol 42, Num 6, pp 27-33, issn 0018-9162, 7 p.Article

SSL/TLS Session-Aware User AuthenticationOPPLIGER, Rolf; HAUSER, Ralf; BASIN, P. David et al.Computer (Long Beach, CA). 2008, Vol 41, Num 3, pp 59-65, issn 0018-9162, 7 p.Article

International Symposium on Human Aspects of Information Security (HAISA)FURNELL, Steven; CLARKE, Nathan.Information management & computer security. 2007, Vol 15, Num 5, pp 362-431, issn 0968-5227, 69 p.Conference Paper

Cryptanalysis of the hash functions MD4 and RIPEMDXIAOYUN WANG; XUEJIA LAI; DENGGUO FENG et al.Lecture notes in computer science. 2005, pp 1-18, issn 0302-9743, isbn 3-540-25910-4, 18 p.Conference Paper

Hardware Designer's Guide to Fault AttacksKARAKLAJIC, Duško; SCHMIDT, Jörn-Marc; VERBAUWHEDE, Ingrid et al.IEEE transactions on very large scale integration (VLSI) systems. 2013, Vol 21, Num 12, pp 2295-2306, issn 1063-8210, 12 p.Article

Detection of Distributed Attacks Based on Hybrid Neural NetworksMARKAROV, V; GHAZARYAN, A.Security & management. International conferenceWorldComp'2010. 2010, pp 589-593, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 5 p.Conference Paper

Botnets, la menace invisible = Botnets, the invisible threatVEYSSET, Franck; BUTTI, Laurent.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2009, Vol SI1, Num H5335, issn 1953-4663, H5335.1-H5335.24, doc.H5335.1 [25 p.]Article

  • Page / 53