Search for "fake" returned 2911 results

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

Legacy Crypto Never Dies
44 min

Legacy Crypto Never Dies

Cracking DES nearly 20 years after the EFF DES Cracker

Anonymous, secure and easy. You can have them all.
51 min

Anonymous, secure and easy. You can have them all.

An authentication protocol that offers security, privacy…

Open Source Your Career
50 min

Open Source Your Career

Fast-track your professional development with community…