Results 51 to 60 of about 1,020 (118)

СПОСОБ МИНИМИЗАЦИИ РИСКА РАСКРЫТИЯ ПАРОЛЯ ПОЛЬЗОВАТЕЛЯ В БАЗАХ ДАННЫХ [PDF]

open access: yes, 2012
Рассмотрим нетипичную реализацию хранения хешей в реляционной базе данных и определим наиболее оптимальный для неё алгоритм хеширования. Особенность данной реализации заключается в значительном увеличении времени, необходимого злоумышленнику, для подбора
Нортенко, Дмитрий Вячеславович   +1 more
core  

Encrypted File Systems [PDF]

open access: yes, 2008
Tato práce se věnuje problematice šifrovaných souborových systémů a je zaměřena převážně na řešení pro operační systém Linux. Nejprve uvádí do problematiky zdůvodněním, proč je nutné šifrovat.
Hlavinka, Michal
core  

Langaton lähiverkko ja tietoturva [PDF]

open access: yes, 2018
Opinnäyteyön tarkoituksena oli perehtyä 802.11-standardiin pohjautuvan langattoman lähiverkon toimintaan ja tutkia yleisimpien langattomiin lähiverkkoihin kohdistuvien hyökkäysten toimintaperiaatetta.
Hätönen, Nico
core  

Wireless network security and cracking security key [PDF]

open access: yes, 2014
Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module)
Bikov, Dusan   +2 more
core  

Real-World Loops are Easy to Predict: A Case Study [PDF]

open access: yes, 2014
International audienceIn this paper we study the relevance of fast and simple solutions to compute approximations of the number of iterations of loops (loop trip count) of imperative real-world programs.
Alves, Péricles   +3 more
core   +1 more source

Public Key Infrastructure based on Authentication of Media Attestments [PDF]

open access: yes, 2013
Many users would prefer the privacy of end-to-end encryption in their online communications if it can be done without significant inconvenience. However, because existing key distribution methods cannot be fully trusted enough for automatic use, key ...
Heinrich, Stuart
core  

Estudio práctico de mecanismos de seguridad en dispositivos Android [PDF]

open access: yes, 2014
Android climbed up to 80 percent of the smartphone and mobile devices market share. One of the key aspects for the acceptance of a mobile OS is the security degree the user perceives from the system.
Jódar Ciurana, Enric   +2 more
core  

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices

open access: yes, 2018
To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs.
Chi, Haotian   +4 more
core   +1 more source

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]

open access: yes, 2011
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Adrian VISOIU, Silvia TRIF
core  

Home - About - Disclaimer - Privacy