Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Ataque informática")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 846

  • Page / 34
Export

Selection :

  • and

Pointer Tainting Still Pointless (but we all see the point of tainting)SLOWINSKA, Asia; BOS, Herbert.Operating systems review. 2010, Vol 44, Num 3, pp 88-92, issn 0163-5980, 5 p.Article

Cybercrime 2.0 : When the Cloud Turns DarkPROVOS, Niels; MOHEEB ABU RAJAB; MAVROMMATIS, Panayiotis et al.Communications of the ACM. 2009, Vol 52, Num 4, pp 42-47, issn 0001-0782, 6 p.Article

3 : Les menaces qui pèsent sur Internet : Web 3.0 L'Avenir d'InternetLa Recherche (Imprimé). 2007, Num 413, pp 40-41, issn 0029-5671, 2 p.Article

Efficient collision search attacks on SHA-OXIAOYUN WANG; HONGBO YU; YIN, Yiqun Lisa et al.Lecture notes in computer science. 2005, pp 1-16, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 16 p.Conference Paper

Protect your library's computersZIMERMAN, Martin.New library world. 2010, Vol 111, Num 1272-3, pp 203-212, issn 0307-4803, 10 p.Article

On the Collision Resistance of RIPEMD-160MENDEL, Florian; PRAMSTALLER, Norbert; RECHBERGER, Christian et al.Lecture notes in computer science. 2006, pp 101-116, issn 0302-9743, isbn 3-540-38341-7, 1Vol, 16 p.Conference Paper

Viewpoint Cyber-victimization and Cybersecurity in ChinaKSHETRI, Nir.Communications of the ACM. 2013, Vol 56, Num 4, pp 35-37, issn 0001-0782, 3 p.Article

Defender personality traitsWHALEN, Tara; GATES, Carrie.Lecture notes in computer science. 2006, pp 85-90, issn 0302-9743, isbn 3-540-33361-4, 1Vol, 6 p.Conference Paper

Improving the Dynamic ID-Based Remote Mutual Authentication SchemeYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 499-507, issn 0302-9743, isbn 3-540-48269-5, 9 p.Conference Paper

Multi-block collisions in hash functions based on 3C and 3C+ enhancements of the merkle-damgard constructionJOOCAK, Daniel; TUMA, Jiri.Lecture notes in computer science. 2006, pp 257-266, issn 0302-9743, isbn 3-540-49112-0, 1Vol, 10 p.Conference Paper

Canaux cachés = Hidden channelsRAYNAL, Frédéric.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num H5860, pp H5860.1-H5860.10Article

Targeted Cyberattacks: A Superset of Advanced Persistent ThreatsSOOD, Aditya K; ENBODY, Richard J.IEEE security & privacy. 2013, Vol 11, Num 1, pp 54-61, issn 1540-7993, 8 p.Article

Social phishingJAGATIC, Tom N; JOHNSON, Nathaniel A; JAKOBSSON, Markus et al.Communications of the ACM. 2007, Vol 50, Num 10, pp 94-100, issn 0001-0782, 7 p.Article

Collisions and Near-Collisions for Reduced-Round TigerKELSEY, John; LUCKS, Stefan.Lecture notes in computer science. 2006, pp 111-125, issn 0302-9743, isbn 3-540-36597-4, 1Vol, 15 p.Conference Paper

Key Substitution Attacks on Multisignature Schemes : Cryptography and Information SecurityBENNIAN DOU; HONG ZHANG; CHEN, Chun-Hua et al.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 244-245, issn 0916-8508, 2 p.Article

US Government Computer Penetration Programs and the Implications for CyberwarHUNT, Edward.IEEE Annals of the history of computing. 2012, Vol 34, Num 3, pp 4-21, issn 1058-6180, 18 p.Article

Cryptanalysis of the Full HAVAL with 4 and 5 PassesHONGBO YU; XIAOYUN WANG; YUN, Aaram et al.Lecture notes in computer science. 2006, pp 89-110, issn 0302-9743, isbn 3-540-36597-4, 1Vol, 22 p.Conference Paper

New applications of time memory data tradeoffsJIN HONG; SARKAR, Palash.Lecture notes in computer science. 2005, pp 353-372, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 20 p.Conference Paper

Genetic algorithm parameter optimization: applied to sensor coverageSAHIN, Ferat; ABBATE, Giuseppe.SPIE proceedings series. 2004, pp 157-168, isbn 0-8194-5363-3, 12 p.Conference Paper

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks, M. Mohammed, A.S.K. Pathan, Auerbach Publications, USA (2013)VIRVILIS, Nikos; GRITZALIS, Dimitris.Computers & security. 2014, Vol 42, pp 191-192, issn 0167-4048, 2 p.Article

Captcha Robustness: A Security Engineering PerspectiveYAN, Jeff; AHMAD SALAH EL AHMAD.Computer (Long Beach, CA). 2011, Vol 44, Num 2, pp 54-60, issn 0018-9162, 7 p.Article

A quantum cipher with near optimal key-recyclingDAMGARD, Ivan; PEDERSEN, Thomas Brochmann; SALVAIL, Louis et al.Lecture notes in computer science. 2005, pp 494-510, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 17 p.Conference Paper

Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks : Cryptography and Information SecurityWASEDA, Atsushi.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 166-170, issn 0916-8508, 5 p.Article

Friend-in-the-Middle Attacks Exploiting Social Networking Sites for Spam : SECURITY PRATICY IN SOCIAL NETWORKSHUBER, Markus; MULAZZANI, Martin; KITZLER, Gerhard et al.IEEE internet computing. 2011, Vol 15, Num 3, pp 28-34, issn 1089-7801, 7 p.Article

SplitScreen: Enabling Efficient, Distributed Malware DetectionSANG KIL CHA; MORARU, Iulian; JIYONG JANG et al.Journal of communication and networks (Seoul. Print). 2011, Vol 13, Num 2, pp 187-200, issn 1229-2370, 14 p.Article

  • Page / 34