Evolutionary design of attack strategies.- Below the salt.- Attacking each other.- Bringing zero-knowledge proofs of knowledge to practice.- Towards a verified reference implementation of a trusted platform module.- Pretty good democracy.- Brief encounters with a random key graph.- Why I'm not an entropist.- A novel stateless authentication protocol.- Establishing distributed hidden friendship relations.- The final word.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.