LASEC
FÉDÉRALE DE LAUSANNE. http://lasecwww.epfl.ch/ gavoine/rfid ... Tag-to-Reader channel: up to a few meters. http://lasecwww.epfl.ch/ gavoine/rfid ...
http://lasecwww.epfl.ch/
popularity:
security
cryptography
research
reference
password
technology
computer
laboratory
epfl
website
|
An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
|
Shadowserver Foundation - Main - HomePage
We are comprised of volunteer security professionals from around the world. ... 09.06.2010: Shadowserver Sinkholing domain associated with SQLi attacks on IIS ...
similarity:
popularity:
security
research
internet
botnets
botnet
reference
malware
computer
hacking
network
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
RSA
No information avaiable
similarity:
popularity:
security
software
rsa
technology
computer
cryptography
encryption
computersoftware
authentication
securid
|
Zone-H.org - IT Security Information Network
Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec
similarity:
popularity:
security
hacking
news
technology
internet
resources
computer
tech
hack
reference
|
Cryptography and Network Security, Fourth Edition
No information avaiable
similarity:
popularity:
cryptography
security
resources
books
reference
education
crypto
book
programming
network
|
CVE - Common Vulnerabilities and Exposures (CVE)
Aims to standardize the names for all publicly known vulnerabilities and security exposures.
similarity:
popularity:
security
vulnerability
reference
vulnerabilities
exploits
hacking
networking
computer
cve
database
|
Shadowserver Foundation - Main - HomePage
Established in 2004, The Shadowserver Foundation gathers intelligence on the ... Our mission is to understand and help put a stop to high stakes cybercrime in ...
similarity:
popularity:
security
research
botnet
malware
hacking
statistics
reference
web
internet
virus
|