×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
a001 documents
Documents
Cryptographic Key Reliable Lifetimes - Bounding the Risk of Key Exposure in the Presence of Faults
Software
illusoryTLS: Impersonate, Tamper, and Exploit
Business
Auscert20150daymarket
Business
The Bazaar, the Maharaja's Ultimatum, and the Shadow of the Future: Extortion and Cooperation in the Zero-Day Market
Technology
Andy, the Polluters, Rick Deckard, and Other Bounty HuntersVulnerabilities and Their Ethical Questions - PHDays VI, Moscow
Technology
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for the Private Sector - HITB GSEC Singapore 2016
Software
illusoryTLS: Nobody But Us Impersonate, Tamper, Exploit (DeepSEC 2015)
Software
The Bazaar, the Maharaja’s Ultimatum, and the Shadow of the Future: Extortion and Cooperation in the Zero-day Market