unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
TRICERT: A Distributed Certified E-Mail Scheme
An Algebraic Approach to IP TracebackDrew Dean, M. Franklin an...
2024-1-7 14:25:1 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
security
drew
franklin
dean
An Architecture for Flexible, High Assurance, Multi-Security Domain Networks
An Algebraic Approach to IP TracebackDrew Dean, M. Franklin an...
2024-1-7 14:25:1 | 阅读: 11 |
收藏
|
NDSS - www.ndss-symposium.org
security
franklin
dean
drew
Authentication and Key Agreement Via Memorable Passwords
An Algebraic Approach to IP TracebackDrew Dean, M. Franklin an...
2024-1-7 14:25:1 | 阅读: 8 |
收藏
|
NDSS - www.ndss-symposium.org
security
franklin
drew
dean
Fighting Spam by Encapsulating Policy in Email Addresses
Fighting Spam by Encapsulating Policy in Email AddressesJohn I...
2024-1-7 11:52:37 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
security
martin
abadi
tal
Moderately Hard, Memory-Bound Functions
Fighting Spam by Encapsulating Policy in Email AddressesJohn I...
2024-1-7 11:52:37 | 阅读: 11 |
收藏
|
NDSS - www.ndss-symposium.org
security
martin
garfinkel
yevgeniy
Secure IP Telephony using Multi-layered Protection
Fighting Spam by Encapsulating Policy in Email AddressesJohn I...
2024-1-7 11:52:37 | 阅读: 13 |
收藏
|
NDSS - www.ndss-symposium.org
security
martin
tal
overflow
Efficient Security Mechanisms for Routing Protocols
Fighting Spam by Encapsulating Policy in Email AddressesJohn I...
2024-1-7 11:52:37 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
security
martin
tal
garfinkel
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing
Fighting Spam by Encapsulating Policy in Email AddressesJohn I...
2024-1-7 11:52:37 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
security
martin
yevgeniy
overflow
Integrating Security, Mobility and Multi-Homing in a HIP Way
Fighting Spam by Encapsulating Policy in Email AddressesJohn I...
2024-1-7 11:52:37 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
security
martin
abadi
overflow
Access Control Based on Execution History
Fighting Spam by Encapsulating Policy in Email AddressesJohn I...
2024-1-7 11:52:37 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
security
martin
abadi
garfinkel
DoS Protection for Reliably Authenticated Broadcast
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
robert
jha
somesh
perrig
Distillation Codes and Applications to DoS Resistant Multicast Authentication
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
jha
somesh
robert
client
Efficient Context-Sensitive Intrusion Detection
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
jha
somesh
robert
mitchell
Global Intrusion Detection in the DOMINO Overlay System
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
somesh
jha
robert
correlation
Building Attack Scenarios through Integration of Complementary Alert Correlation Method
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
robert
jha
somesh
kevin
Client-Side Defense Against Web-Based Identity Theft
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
somesh
robert
jha
delegating
Using Directional Antennas to Prevent Wormhole Attacks
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
somesh
robert
jha
khanna
An Effective Architecture and Algorithm for Detecting Worms with Various Scan
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
jha
somesh
robert
vipul
A Practical Dynamic Buffer Overflow Detector
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
somesh
robert
jha
Model Checking One Million Lines of C Code
DoS Protection for Reliably Authenticated BroadcastCarl A. Gun...
2024-1-6 14:27:10 | 阅读: 10 |
收藏
|
NDSS - www.ndss-symposium.org
jha
somesh
robert
kevin
Previous
12
13
14
15
16
17
18
19
Next