×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
EigenSpeed: Secure peer-to-peer bandwidth evaluation.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
EigenSpeed: Secure peer-to-peer bandwidth evaluation.pdf
PDF
5 years ago
421.29 kB
Copy Link
Efficient LDPC code based secret sharing schemes and private data storage in cloud without encryption.pdf
PDF
5 years ago
330.02 kB
Copy Link
Enabling Sophisticated Analyses of x86 Binaries with RevGen.pdf
PDF
5 years ago
111.58 kB
Copy Link
EXE - A System for Automatically Generating Inputs of Death Using Symbolic Execution.pdf
PDF
5 years ago
193.01 kB
Copy Link
Entropy Loss and Output Predictability in the Libgcrypt PRNG - CVE-2016-6313 - 2016.pdf
PDF
5 years ago
157.38 kB
Copy Link
Dytan - A Generic Dynamic Taint Analysis Framework.pdf
PDF
5 years ago
347.59 kB
Copy Link
ExSpectre: Hiding malware in speculative execution - 2019.pdf
PDF
5 years ago
698.80 kB
Copy Link
Dynamic Test Generation for Large Binary Programs.pdf
PDF
5 years ago
1.25 MB
Copy Link
Experiences with Model Inference Assisted Fuzzing.pdf
PDF
5 years ago
141.04 kB
Copy Link
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software.pdf
PDF
5 years ago
196.45 kB
Copy Link
ExperimenTor: A testbed for safe and realistic Tor experimentation.pdf
PDF
5 years ago
478.44 kB
Copy Link
Dynamic Taint Analysis and Forward Symbolic Execution.pdf
PDF
5 years ago
283.30 kB
Copy Link
Exploiting bittorrent vulnerabilities to launch reflective DDoS attacks.pdf
PDF
5 years ago
118.78 kB
Copy Link
Developing Applications With Objective Caml.pdf
PDF
5 years ago
2.74 MB
Copy Link
Factoring RSA keys from certified smart cards - Coppersmith in the wild.pdf
PDF
5 years ago
359.63 kB
Copy Link
Deriving Input Syntactic Structure From Execution.pdf
PDF
5 years ago
545.68 kB
Copy Link
Fingerprinting Tor's hidden service log files using a timing channel.pdf
PDF
5 years ago
361.90 kB
Copy Link
Decentralized public key infrastructure - a white paper from Rebooting the Web of Trust.pdf
PDF
5 years ago
658.36 kB
Copy Link
Flayer - Exposing Application Internals.pdf
PDF
5 years ago
80.99 kB
Copy Link
Decentralized certificate authorities - 2017.pdf
PDF
5 years ago
729.76 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.