Warehouse Stock Clearance Sale

Grab a bargain today!


Security Protocols XXVI
By

Rating

Product Description
Product Details

Table of Contents

Raven Authentication Service - Attacks and Countermeasures.- Raven Authentication Service - Attacks and Countermeasures (Transcript of Discussion).- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations.- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion).- Non-Monotonic Security Protocols and Failures in Financial Intermediation.- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion).- HoneyPAKEs.- HoneyPAKEs (Transcript of Discussion).- Entropy crowdsourcing - protocols for link key updates in wireless sensor Networks.- Entropy crowdsourcing - protocols for link key updates in wireless sensor networks (Transcript of Discussion).- Daemones non Operantur Nisi per Artem.- Daemones non Operantur Nisi per Artem (Transcript of Discussion).- Intentionality and agency in security.- Intentionality and agency in security (Transcript of Discussion).- Incentives in Security Protocols.- Incentives in Security Protocols (Transcript of Discussion).- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System.- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion).- How does match-fixing inform computer game security.- How does match-fixing inform computer game security? (Transcript of Discussion).- From Secure Messaging to Secure Collaboration.- From Secure Messaging to Secure Collaboration (Transcript of Discussion).- Requirements for Root of Trust Establishment.- Requirements for Root of Trust Establishment (Transcript of Discussion).- User Authentication for the Internet of Things.- User Authentication for the Internet of Things (Transcript of Discussion).- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough.- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough (Transcript of Discussion).- Making Bitcoin Legal.- Making Bitcoin Legal (Transcript of Discussion).- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do.- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do (Transcript of Discussion).- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices.- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).

 

Ask a Question About this Product More...
 
People also searched for
Item ships from and is sold by Fishpond Retail Limited.

Back to top