Home
/
Books
/
computersciencetheory
File Name
Size
Date
..
—
—
analysis
—
04-07-2024 16:34:04
attestation
—
04-07-2024 16:34:04
exploit development
—
04-07-2024 16:34:03
malware
—
04-07-2024 16:34:04
A Remote Software-Induced Fault Attack in JavaScript.pdf.gz
126.33KB
04-07-2024 16:34:06
A Simple and Efficient Universal Reversable Turing Machine [slides] (2011) - Axelsen, Glück.pdf.gz
679.79KB
04-07-2024 16:34:06
A Trusted Platform Module for Near Field Communication (2010) - Hutter, Toegl.pdf.gz
768.83KB
04-07-2024 16:34:06
AI Publications Memo #39 (1962) - Hart, Levin.pdf.gz
748.31KB
04-07-2024 16:34:06
Abusing Cloud-Based Browsers for Fun and Profit (2013) - Tendulkar, Pletcher, Shashidharan, Snyder, Butler, Enck.pdf.gz
419.81KB
04-07-2024 16:34:05
Anonymous Card Shuffling and its Applications to Parallel Mixnets (2012) - Goodrich, Mitzenmacher.pdf.gz
305.74KB
04-07-2024 16:34:05
Anti-SAT Mitigating SAT Attack on Logic Locking (2017) - Xie, Srivastava.pdf.gz
1.55MB
04-07-2024 16:34:06
Applications of Mathematics and Informatics in Science and Engineering (2014) - Daras.pdf.gz
7.40MB
04-07-2024 16:34:06
Asymmetric proof-of-work based on the Generalized Birthday Problem (2015) - Biryukov, Khovratovich.pdf.gz
406.11KB
04-07-2024 16:34:06
Attacking Intel Trusted Execution technology (2013) - Wojtczuk, Rutkowska.pdf.gz
140.83KB
04-07-2024 16:34:06
Auditing for Distributed Storage Systems (2013) - Le, Markopoulou, Dimakis.pdf.gz
481.70KB
04-07-2024 16:34:06
Backdoors to Tractable Answer-Set Programming (2012) - Fichte, Szeider.pdf.gz
172.85KB
04-07-2024 16:34:06
Characterization and Measurement of TCP Traversal through NATs and Firewalls (2005) - Guha, Francis.pdf.gz
108.97KB
04-07-2024 16:34:06
Distributed Estimation in Multi-Agent Networks (2012) - Sankar, Poor.pdf.gz
95.39KB
04-07-2024 16:34:06
Efficient Turing-Universal Computation with DNA Polymers (2011) - Qian, Soloveichik, Winfree.pdf.gz
264.00B
04-07-2024 16:34:06
Entropy Based Analysis of DNS Query Traffic in the Campus Network - Romaña, Musushi.pdf.gz
85.33KB
04-07-2024 16:34:05
Equilibria of Chinese Auctions (2012) - Brânzei, Forero, Larson, Miltersen.pdf.gz
112.31KB
04-07-2024 16:34:04
Few Electron Limit of n-type Metal Oxide Semiconductor Single Electron Transistors (2012) - Prati et. al.pdf.gz
367.00B
04-07-2024 16:34:06
Fingerprinting Web Application Platforms by Variations in PNG Implementations (2015) - Bongard.pdf.gz
651.12KB
04-07-2024 16:34:06
FlowSpec BGP Policy-Based Routing [slides] (2011) - Gabut-Deloraine.pdf.gz
266.65KB
04-07-2024 16:34:06
Gyrophone Recognizing Speech From Gyroscope Signals (2014) - Michalevsky, Boneh, Nakibly.pdf.gz
3.56MB
04-07-2024 16:34:06
How to Build an Introductory Linux Cluster for Parallel Computing (2003) - He, Ni.pdf.gz
152.86KB
04-07-2024 16:34:06
IMSI-Catch Me If You Can IMSI-Catcher-Catchers (2014) - Dabrowski, Pianta, Klepp, Mulazzani, Weippl.pdf.gz
2.19MB
04-07-2024 16:34:06
Identifying and Characterizing Anycast in the Domain Name System (2011) - Fan, Heidemann, Govindan.pdf.gz
327.54KB
04-07-2024 16:34:05
Increased DNS Forgery Resistance Through 0x20-Bit Encoding SecURItY viA LeET QueRieS (2008) - Dagon, Antonakakis, Vixie, Jinmei, Lee.pdf.gz
451.71KB
04-07-2024 16:34:06
Intel Architecture Instruction Set Extensions Programming Reference (2015).pdf.gz
4.33MB
04-07-2024 16:34:06
International Journal on Advances in Security, Vol. IV, 1-2 (2011) - IARIA.pdf.gz
8.66MB
04-07-2024 16:34:06
Invertible Bloom Lookup Tables (2011) - Goodrich, Mitzenmacher.pdf.gz
251.70KB
04-07-2024 16:34:05
Is Brain Emulation Dangerous (2012) - Eckersley, Sandberg.pdf.gz
162.83KB
04-07-2024 16:34:06
LT^2C^2 A language of thought with Turing-computable Kolmogorov Complexity (2013) - Romano, Sigman, Figueira.pdf.gz
205.41KB
04-07-2024 16:34:06
Measuring the Security Harm of TLS Crypto Shortcuts (2016) - Springall, Durumeric, Halderman.pdf.gz
639.00KB
04-07-2024 16:34:06
MinimaLT Minimal-latency Networking Through Better Security (2013) - Petullo, Zhang, Solworth, Bernstein, Lange.pdf.gz
453.38KB
04-07-2024 16:34:06
Off-Path TCP Exploits Global Rate Limit Considered Dangerous (2016) - Cao et. al.pdf.gz
1.28MB
04-07-2024 16:34:04
On Omitting Commits and Committing Omissions Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities (2016) - Torres-Arias, Ammula, Curtmola, Cappos.pdf.gz
419.45KB
04-07-2024 16:34:06
OpenDTex Linux Secure Boot (2014) [31c3] - Guihéry.pdf.gz
184.36KB
04-07-2024 16:34:04
Optical Time-Domain Eavesdropping Risks of CRT Displays (2002) - Kuhn.pdf.gz
371.46KB
04-07-2024 16:34:06
Optimal Algorithms for Byzantine Agreement (1983) - Feldman.pdf.gz
4.94MB
04-07-2024 16:34:06
Radio Frequency Identification Security and Privacy Issues 6th International Workshop Selected Papers (2010).pdf.gz
2.74MB
04-07-2024 16:34:05
Russian Peasant Multiplication Algorithm, RSA Cryptosystem, and a New Explanation of Half-Orders of Magnitude (2007) - Vargas, Kosheleva.pdf.gz
181.39KB
04-07-2024 16:34:05
Shadow Walker Raising The Bar For Rootkit Detection (2006) - Sparks, Butler.pdf.gz
534.74KB
04-07-2024 16:34:06
Software Architecture Patterns (2015) - Richards.pdf.gz
5.16MB
04-07-2024 16:34:06
The Adaptive Radix Tree ARTful Indexing for Main-Memory Databases (2004) - Leis et. al.pdf.gz
565.47KB
04-07-2024 16:34:05
The Rogue Genius Micro-Tasking System.pdf.gz
309.70KB
04-07-2024 16:34:05
The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet (2005) - Beverly, Bauer.pdf.gz
114.05KB
04-07-2024 16:34:06
The X-Tree An Index Structure for High-Dimensional Data (1996) - Berchtold et. al.pdf.gz
150.41KB
04-07-2024 16:34:06
This POODLE Bites Exploiting the SSL 3.0 Fallback (2014) - Möller, Duong, Kotowicz.pdf.gz
205.40KB
04-07-2024 16:34:06
Touch'n'Trust An NFC-enabled Trusted Platform Module (2011) - Hutter, Toegl.pdf.gz
2.04MB
04-07-2024 16:34:06
Turkit human computation algorithms on mechanical turk (2010) - Little, Chilton, Goldman, Miller.pdf.gz
267.85KB
04-07-2024 16:34:05
Using Trusted Execution Environments in Two-Factor Authentication comparing approaches (2014) - Rijswijk-Deij, Poll.pdf.gz
260.72KB
04-07-2024 16:34:06
We Can Hear You with WiFi! (2015) - Wang et. al.pdf.gz
1.25MB
04-07-2024 16:34:06
What's the Difference Efficient Set Reconciliation without Prior Context (2011) - Eppstein, Goodrich, et. al.pdf.gz
717.97KB
04-07-2024 16:34:06
reCAPTCHA Human-Based Character Recognition via Web Security Measures (2008) - von Ahn, Maurer, McMillen, Abraham, Blum.pdf.gz
205.17KB
04-07-2024 16:34:05
10" >