Search
Search Funnelback University
- Refined by:
- Date: 2013
11 -
20 of
57
search results for `Robert Watson`
Fully-matching results
-
Computer Laboratory – Course pages 2012–13: Concurrent and…
https://www.cl.cam.ac.uk/teaching/1213/ConcDisSys/materials.html26 Feb 2013: 2013 Computer Laboratory, University of Cambridge. Information provided by Dr Robert Watson. -
Computer Laboratory – Capsicum: practical capabilities for UNIX:…
https://www.cl.cam.ac.uk/research/security/capsicum/projects.html24 Oct 2013: 2008–2012 Robert N. M. Watson, Jonathan Anderson. Information provided by Robert Watson. -
Computer Laboratory – Course pages 2012–13: Current Applications and…
https://www.cl.cam.ac.uk/teaching/1213/R210/materials.html26 Feb 2013: optional further reading) Exploiting Concurrency Vulnerabilities in System Call Wrappers, Robert Watson, WOOT'07: First USENIX Workshop on Offensive Technologies. -
Computer Laboratory – Capsicum: practical capabilities for UNIX:…
https://www.cl.cam.ac.uk/research/security/capsicum/related.html24 Oct 2013: also developed at Cambridge! 2008–2012 Robert N. M. Watson, Jonathan Anderson. ... Information provided by Robert Watson. -
Computer Laboratory – Capsicum: practical capabilities for UNIX: Code
https://www.cl.cam.ac.uk/research/security/capsicum/code.html24 Oct 2013: 2008–2012 Robert N. M. Watson, Jonathan Anderson. Information provided by Robert Watson. -
Computer Laboratory – Course pages 2012–13: Security II – Course…
https://www.cl.cam.ac.uk/teaching/1213/SecurityII/materials.html17 Feb 2013: Dr Sergei Skorobogatov: hardware security (4 Feb). Dr Robert Watson: concurrency (11 Feb). -
201310114-r209-intro
https://www.cl.cam.ac.uk/teaching/1314/R209/20131014-r209-intro.pdf14 Oct 2013: Presentation schedule has been e-mailed out• If you like, you can exchange slots…• … but both students must agree, and let us know in advance• E-mail ... there! • If you are not registered, but are sitting in, please e-mail -
TESLA: include/libtesla.h Source File
https://www.cl.cam.ac.uk/research/security/ctsrd/tesla/api/libtesla_8h_source.html10 Jul 2013: 1 /-. 2 Copyright (c) 2011 Robert N. -
Anonymity and Censorship Resistance Tor Node Tor Node Tor ...
https://www.cl.cam.ac.uk/teaching/1213/SecurityII/2013-security2-3-murdoch.pdf14 Jan 2013: Tor Node. Exit node. Entry nodeMiddle node. Diagram: Robert Watson. Tor hides communication patterns byrelaying data through volunteer servers. ... Diagram: Robert Watson. Tor uses two types of encryption. Entry Middle Exit. -
TESLA: libtesla/src/tesla_util.c Source File
https://www.cl.cam.ac.uk/research/security/ctsrd/tesla/api/tesla__util_8c_source.html10 Jul 2013: 1 /-. 2 Copyright (c) 2011 Robert N.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.