Search

Search Funnelback University

Search powered by Funnelback
11 - 20 of 57 search results for `Robert Watson`
  1. Fully-matching results

  2. Computer Laboratory – Course pages 2012–13: Concurrent and…

    https://www.cl.cam.ac.uk/teaching/1213/ConcDisSys/materials.html
    26 Feb 2013: 2013 Computer Laboratory, University of Cambridge. Information provided by Dr Robert Watson.
  3. Computer Laboratory – Capsicum: practical capabilities for UNIX:…

    https://www.cl.cam.ac.uk/research/security/capsicum/projects.html
    24 Oct 2013: 2008–2012 Robert N. M. Watson, Jonathan Anderson. Information provided by Robert Watson.
  4. Computer Laboratory – Course pages 2012–13: Current Applications and…

    https://www.cl.cam.ac.uk/teaching/1213/R210/materials.html
    26 Feb 2013: optional further reading) Exploiting Concurrency Vulnerabilities in System Call Wrappers, Robert Watson, WOOT'07: First USENIX Workshop on Offensive Technologies.
  5. Computer Laboratory – Capsicum: practical capabilities for UNIX:…

    https://www.cl.cam.ac.uk/research/security/capsicum/related.html
    24 Oct 2013: also developed at Cambridge! 2008–2012 Robert N. M. Watson, Jonathan Anderson. ... Information provided by Robert Watson.
  6. Computer Laboratory – Capsicum: practical capabilities for UNIX: Code

    https://www.cl.cam.ac.uk/research/security/capsicum/code.html
    24 Oct 2013: 2008–2012 Robert N. M. Watson, Jonathan Anderson. Information provided by Robert Watson.
  7. Computer Laboratory – Course pages 2012–13: Security II – Course…

    https://www.cl.cam.ac.uk/teaching/1213/SecurityII/materials.html
    17 Feb 2013: Dr Sergei Skorobogatov: hardware security (4 Feb). Dr Robert Watson: concurrency (11 Feb).
  8. 201310114-r209-intro

    https://www.cl.cam.ac.uk/teaching/1314/R209/20131014-r209-intro.pdf
    14 Oct 2013: Presentation schedule has been e-mailed out• If you like, you can exchange slots…• … but both students must agree, and let us know in advance• E-mail ... there! • If you are not registered, but are sitting in, please e-mail
  9. TESLA: include/libtesla.h Source File

    https://www.cl.cam.ac.uk/research/security/ctsrd/tesla/api/libtesla_8h_source.html
    10 Jul 2013: 1 /-. 2 Copyright (c) 2011 Robert N.
  10. Anonymity and Censorship Resistance Tor Node Tor Node Tor ...

    https://www.cl.cam.ac.uk/teaching/1213/SecurityII/2013-security2-3-murdoch.pdf
    14 Jan 2013: Tor Node. Exit node. Entry nodeMiddle node. Diagram: Robert Watson. Tor hides communication patterns byrelaying data through volunteer servers. ... Diagram: Robert Watson. Tor uses two types of encryption. Entry Middle Exit.
  11. TESLA: libtesla/src/tesla_util.c Source File

    https://www.cl.cam.ac.uk/research/security/ctsrd/tesla/api/tesla__util_8c_source.html
    10 Jul 2013: 1 /-. 2 Copyright (c) 2011 Robert N.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.