Results 51 to 60 of about 1,020 (118)
СПОСОБ МИНИМИЗАЦИИ РИСКА РАСКРЫТИЯ ПАРОЛЯ ПОЛЬЗОВАТЕЛЯ В БАЗАХ ДАННЫХ [PDF]
Рассмотрим нетипичную реализацию хранения хешей в реляционной базе данных и определим наиболее оптимальный для неё алгоритм хеширования. Особенность данной реализации заключается в значительном увеличении времени, необходимого злоумышленнику, для подбора
Нортенко, Дмитрий Вячеславович +1 more
core
Tato práce se věnuje problematice šifrovaných souborových systémů a je zaměřena převážně na řešení pro operační systém Linux. Nejprve uvádí do problematiky zdůvodněním, proč je nutné šifrovat.
Hlavinka, Michal
core
Langaton lähiverkko ja tietoturva [PDF]
Opinnäyteyön tarkoituksena oli perehtyä 802.11-standardiin pohjautuvan langattoman lähiverkon toimintaan ja tutkia yleisimpien langattomiin lähiverkkoihin kohdistuvien hyökkäysten toimintaperiaatetta.
Hätönen, Nico
core
Wireless network security and cracking security key [PDF]
Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module)
Bikov, Dusan +2 more
core
Real-World Loops are Easy to Predict: A Case Study [PDF]
International audienceIn this paper we study the relevance of fast and simple solutions to compute approximations of the number of iterations of loops (loop trip count) of imperative real-world programs.
Alves, Péricles +3 more
core +1 more source
Public Key Infrastructure based on Authentication of Media Attestments [PDF]
Many users would prefer the privacy of end-to-end encryption in their online communications if it can be done without significant inconvenience. However, because existing key distribution methods cannot be fully trusted enough for automatic use, key ...
Heinrich, Stuart
core
Estudio práctico de mecanismos de seguridad en dispositivos Android [PDF]
Android climbed up to 80 percent of the smartphone and mobile devices market share. One of the key aspects for the acceptance of a mobile OS is the security degree the user perceives from the system.
Jódar Ciurana, Enric +2 more
core
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices
To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs.
Chi, Haotian +4 more
core +1 more source
A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Adrian VISOIU, Silvia TRIF
core

