Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities (2016) - Torres-Arias, Ammula, Curtmola, Cappos.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
computer science theory
/
Parent Folder
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities (2016) - Torres-Arias, Ammula, Curtmola, Cappos.pdf.gz
GZ
2 years ago
Get Size
Copy Link
OpenDTex: Linux Secure Boot (2014) [31c3] - GuiheΜry.pdf.gz
GZ
2 years ago
184.36 kB
Copy Link
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous (2016) - Cao et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Optical Time-Domain Eavesdropping Risks of CRT Displays (2002) - Kuhn.pdf.gz
GZ
2 years ago
Get Size
Copy Link
MinimaLT: Minimal-latency Networking Through Better Security (2013) - Petullo, Zhang, Solworth, Bernstein, Lange.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Measuring the Security Harm of TLS Crypto Shortcuts (2016) - Springall, Durumeric, Halderman.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Optimal Algorithms for Byzantine Agreement (1983) - Feldman.pdf.gz
GZ
2 years ago
Get Size
Copy Link
LT^2C^2: A language of thought with Turing-computable Kolmogorov Complexity (2013) - Romano, Sigman, Figueira.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop Selected Papers (2010).pdf.gz
GZ
2 years ago
Get Size
Copy Link
Is Brain Emulation Dangerous (2012) - Eckersley, Sandberg.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Russian Peasant Multiplication Algorithm, RSA Cryptosystem, and a New Explanation of Half-Orders of Magnitude (2007) - Vargas, Kosheleva.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Invertible Bloom Lookup Tables (2011) - Goodrich, Mitzenmacher.pdf.gz
GZ
2 years ago
Get Size
Copy Link
International Journal on Advances in Security, Vol. IV, 1-2 (2011) - IARIA.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Shadow Walker: Raising The Bar For Rootkit Detection (2006) - Sparks, Butler.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Software Architecture Patterns (2015) - Richards.pdf.gz
GZ
2 years ago
106 bytes
Copy Link
Intel Architecture Instruction Set Extensions Programming Reference (2015).pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Increased DNS Forgery Resistance Through 0x20-Bit Encoding: SecURItY viA LeET QueRieS (2008) - Dagon, Antonakakis, Vixie, Jinmei, Lee.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Identifying and Characterizing Anycast in the Domain Name System (2011) - Fan, Heidemann, Govindan.pdf.gz
GZ
2 years ago
Get Size
Copy Link
The Adaptive Radix Tree: ARTful Indexing for Main-Memory Databases (2004) - Leis et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
IMSI-Catch Me If You Can: IMSI-Catcher-Catchers (2014) - Dabrowski, Pianta, Klepp, Mulazzani, Weippl.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.