There is no excerpt because this is a protected post.
Author: Anca-Maria Nica
Protected: Lab.05 Information SecurityProtected: Lab.05 Information Security
There is no excerpt because this is a protected post.
SI 2023SI 2023
Bun venit. Catre siteul disciplinei aici.
Protected: Lab.12 Information SecurityProtected: Lab.12 Information Security
There is no excerpt because this is a protected post.
Lab.03 Information SecurityLab.03 Information Security
Impersonation and MITM attacks on authentication protocols (2) Protocols (quick review of some protocols – video) TCP/IP protocol (FTP, SSH, Telnet, email – IMAP, POP, SMTP…) vs UDP ARP Spoofing
Lab.02 Information SecurityLab.02 Information Security
Impersonation and man-in-the-middle attacks (1) Attacks (see the slide 9 from the first lecture) – outsider / insider – passive / active – coalition Concepts (see the slides from the
Protected: Lab.01 Information SecurityProtected: Lab.01 Information Security
There is no excerpt because this is a protected post.
Cursuri despre Internetul lucrurilorCursuri despre Internetul lucrurilor
Bună, Acest domeniu este unul relativ nou în universitațile din România dar, pe cât de nou, pe atât de efervescent și captivant. Voi pune mai jos câteva cursuri în domeniu
Quadratic residuosity in CriptographyQuadratic residuosity in Criptography
Here are some articles on this topic and it can be useful at some point. 2020 Anonymous IBE from Quadratic Residuosity with Fast Encryption (Xiaopeng Zhao and Zhenfu Cao) Anonymous
Higher order residues – bibliographyHigher order residues – bibliography
Recent work These are some recent articles on higher residuosity. 2020 A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption (Diana Maimuţ and George Teşeleanu)