A Longitudinal Study of Cryptographic API: A Decade of Android Malware | 0 | 0.34 | 2022 |
Even If Users Do Not Read Security Directives, Their Behavior Is Not So Catastrophic | 0 | 0.34 | 2022 |
Large-scale Randomness Study of Security Margins for 100+Cryptographic Functions | 0 | 0.34 | 2022 |
On Automated Rbac Assessment By Constructing A Centralized Perspective For Microservice Mesh | 1 | 0.35 | 2021 |
Privacy-friendly Monero transaction signing on a hardware wallet, extended version. | 0 | 0.34 | 2020 |
ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks | 1 | 0.34 | 2020 |
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers | 0 | 0.34 | 2020 |
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. | 0 | 0.34 | 2020 |
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks. | 0 | 0.34 | 2019 |
When Lagged Fibonacci Generators jump. | 0 | 0.34 | 2019 |
Will you trust this TLS certificate?: perceptions of people working in IT | 1 | 0.35 | 2019 |
Examining PBKDF2 security margin—Case study of LUKS | 0 | 0.34 | 2019 |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. | 0 | 0.34 | 2019 |
PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks. | 0 | 0.34 | 2019 |
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. | 0 | 0.34 | 2019 |
Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version. | 0 | 0.34 | 2018 |
Bringing Kleptography to Real-World TLS. | 0 | 0.34 | 2018 |
A Large-Scale Comparative Study of Beta Testers and Standard Users. | 0 | 0.34 | 2018 |
A large-scale comparative study of beta testers and regular users. | 1 | 0.38 | 2018 |
Adaptive Secrecy Amplification with Radio Channel Key Extraction | 0 | 0.34 | 2018 |
Practical Cryptographic Data Integrity Protection with Full Disk Encryption. | 1 | 0.35 | 2018 |
Experimental large-scale review of attractors for detection of potentially unwanted applications. | 0 | 0.34 | 2018 |
Evolving boolean functions for fast and efficient randomness testing. | 0 | 0.34 | 2018 |
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability. | 1 | 0.36 | 2018 |
Investigating results and performance of search and construction algorithms for word-based LFSRs, σ-LFSRs. | 1 | 0.35 | 2018 |
Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm. | 0 | 0.34 | 2017 |
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. | 1 | 0.35 | 2017 |
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. | 6 | 0.51 | 2017 |
The Million-Key Question - Investigating The Origins Of Rsa Public Keys | 4 | 0.46 | 2016 |
Randomness Testing: Result Interpretation and Speed. | 0 | 0.34 | 2016 |
Reconsidering Attacker Models in Ad-Hoc Networks. | 0 | 0.34 | 2016 |
Towards better selective forwarding and delay attacks detection in wireless sensor networks | 5 | 0.49 | 2016 |
Selecting a New Key Derivation Function for Disk Encryption | 0 | 0.34 | 2015 |
The Challenge of Increasing Safe Response of Antivirus Software Users. | 0 | 0.34 | 2015 |
On Secrecy Amplification Protocols | 0 | 0.34 | 2015 |
Service in Denial - Clouds Going with the Winds. | 1 | 0.36 | 2015 |
Challenges of Fiction in Network Security - Perspective of Virtualized Environments. | 0 | 0.34 | 2015 |
Analyzing Traffic Features of Common Standalone DoS Attack Tools. | 1 | 0.37 | 2015 |
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings | 0 | 0.34 | 2014 |
The TrueCrypt On-Disk Format--An Independent View | 0 | 0.34 | 2014 |
On Node Capturing Attacker Strategies. | 2 | 0.41 | 2014 |
Red Queen's Race: APT Win-Win Game. | 0 | 0.34 | 2014 |
Evaluation of Key Management Schemes in Wireless Sensor Networks. | 0 | 0.34 | 2014 |
Traversing symmetric NAT with predictable port allocation | 0 | 0.34 | 2014 |
Improving Intrusion Detection Systems for Wireless Sensor Networks. | 5 | 0.49 | 2014 |
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. | 0 | 0.34 | 2013 |
Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks | 3 | 0.41 | 2013 |
An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications. | 0 | 0.34 | 2013 |
Using encryption for authentication: Wireless sensor network case. | 0 | 0.34 | 2013 |
Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks | 3 | 0.41 | 2013 |