former_member250411
Explorer
Member since ‎09-24-2013

User Statistics

  • 6 Posts
  • 0 Solutions
  • 17 Kudos given
  • 26 Kudos received

User Activity

Are security proofs for cryptographic protocols still valid in a world where the attackers have quantum computers? Which new ways of securing the confidentiality of the internet traffic are offered by quantum communication? How can a random oracle op...
Thanks to package managers like Maven, pip or npm, the consumption of open source components is a very natural part of software development. By now, the majority of modern software applications - commercial or not - depends on at least one open sourc...
It is well known that data collection is the focus and the monetization basis for some of the largest companies in the world. Moreover, machine learning solutions are increasingly deployed and they require massive amounts of training data. Such valua...
In a competitive environment, companies are often interested in knowing how they perform compared to competitors. This allows to identify in which area they need to make improvements or modify their best practices and take decisions to increase some ...
Attackers always had the higher ground in the cyber space. To infiltrate systems, they can use a variety of social engineering tricks, combined with low cost automated attacks. It is time for defenders to make a stand, with something that will give...