×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [levente buttyn]
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Appendix A: Introduction to cryptographic
214 views
The role of threat intelligence in combating against targeted malware attacks Boldizsár Bencsáth Budapest University of Technology and Economics Department
213 views
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for
213 views
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 2 – Upcoming networks Generalities
214 views
Abusing Duqu, Flame, MiniFlame Boldizsár Bencsáth PhD Budapest University of Technology and Economics Department of Telecommunications Laboratory of Cryptography
214 views
Introduction. © Levente Buttyán 2 Outline TCP/IP networking overview protocols and known vulnerabilities – ARP / ARP spoofing – IP / eavesdropping,
229 views
© Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 7: Secure routing in multi-hop
214 views
1 Laboratory for Computer Communications and Application (LCA) Swiss Federal Institute of Technology (EPFL) Srdjan Čapkun joint work with Jean-Pierre Hubaux
215 views
Technical analysis and information sharing in the handling of high-profile targeted attacks Boldizsár Bencsáth Laboratory of Cryptography and System Security
216 views
Laboratory for Computer Communications and Application (LCA)
34 views
Abusing Duqu, Flame, MiniFlame
32 views
Technical analysis and information sharing in the handling of high-profile targeted attacks
36 views