×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [covert channel]
Conscript Your Friends into Larger Anonymity Sets with JavaScript ACM Workshop on Privacy in the Electronic Society 4 November 2013 Henry Corrigan-Gibbs
218 views
File000149
488 views
State of endpoint risk v3
326 views
Алексей Лукацкий (Cisco) - Безопасность внутренней сети
246 views
CONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan Kuskos
14 views
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
626 views
BY Muhammad Kazim SUPERVISOR: Dr. Awais Shibli. Introduction Literature Survey Problem Statement OpenStack Proposed Solution and Design Major
218 views
Practical Timing Side Channel Attacks Against Kernel Space ASLR Fall 2014 Instructor: Kun Sun, Ph.D
218 views
A. Haeberlen Differential Privacy Under Fire 1 USENIX Security (August 12, 2011) Andreas Haeberlen Benjamin C. Pierce Arjun Narayan University of Pennsylvania
215 views
Conclusion 1 Conclusion Conclusion 2 Course Summary Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis Access
240 views
Anonymization and Privacy Services Infranet: Circumventing Web Censorship and Surveillance, Feamster et al, Usenix Security Symposium 2002
217 views
AFOSR PROGRAM REVIEW JUNE 5-7, 2003 PRINCETON, NJ DATA HIDING IN TIME-FREQUENCY DISTRIBUTION OF IMAGES Bijan Mobasseri ECE Department Villanova University
217 views
< Prev
Next >