منابع مشابه
Phishing: How an Organization can Protect Itself
The objective of this paper is to report on research to construct a model, which should provide guidance to an organization on how to address all dimensions associated with phishing and assist in solving the problem holistically. The emphasis will be placed on the human and organizational dimensions. Most research in this area has shown that only certain dimensions used to combat phishing attac...
متن کاملHow predation can slow, stop or reverse a prey invasion.
Observations on Mount St Helens indicate that the spread of recolonizing lupin plants has been slowed due to the presence of insect herbivores and it is possible that the spread of lupins could be reversed in the future by intense insect herbivory [Fagan, W. F. and J. Bishop (2000). Trophic interactions during primary sucession: herbivores slow a plant reinvasion at Mount St. Helens. Amer. Nat....
متن کاملHow Perfect Offline Wallets Can Still Leak Bitcoin Private Keys
ECDSA has become a popular choice as lightweight alternative to RSA and classic DL based signature algorithms in recent years. As standardized, the signature produced by ECDSA for a pair of a message and a key is not deterministic. This work shows how this non-deterministic choice can be exploited by an attacker to leak private information through the signature without any side channels, an att...
متن کاملCan a Program Reverse-Engineer Itself?
Shape-memory alloys are metal pieces that "remember" their original cold-forged shapes and return to the pre-deformed shape after heating. In this work we construct a software analogous of shape-memory alloys: programs whose code resists obfuscation. We show how to pour arbitrary functions into protective envelops that allow recovering the functions' exact initial code after obfuscation. We exp...
متن کاملHow to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and no coordination: any user can choose any set of possible signers that includes himself, and sign ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physics
سال: 2023
ISSN: ['2624-8174']
DOI: https://doi.org/10.1103/physics.16.60