The following list of posts is filtered
Clear Filter
Posts
The Neovote e-voting system was used for three of the five primaries in the French 2022 presidential election The UMBC Cyber Defense Lab presents More holes than cheese: Vulnerabilities of the...
May 9, 2022
·
9:12 PM
The Neovote e-voting system was used for three of the five primaries in the French 2022 presidential election The UMBC Cyber Defense Lab presents More holes than cheese: Vulnerabilities of the...
May 9, 2022
·
9:12 PM
The Neovote e-voting system was used for three of the five primaries in the French 2022 presidential election The UMBC Cyber Defense Lab presents More holes than cheese:...
May 9, 2022
·
9:12 PM
The UMBC Cyber Defense Lab presents Model Validation for DARPA DPRIVE Ian Blumenfeld UMBC and Two Six Technologies (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew...
April 28, 2022
·
9:57 AM
The UMBC Cyber Defense Lab presents Model Validation for DARPA DPRIVE Ian Blumenfeld UMBC and Two Six Technologies (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew...
April 28, 2022
·
9:57 AM
The UMBC Cyber Defense Lab presents Model Validation for DARPA DPRIVE Ian Blumenfeld UMBC and Two Six Technologies (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul...
April 28, 2022
·
9:57 AM
With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...
April 11, 2022
·
3:30 PM
With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...
April 11, 2022
·
3:30 PM
With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...
April 11, 2022
·
3:30 PM
Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session The UMBC Cyber Defense Lab presents A Formal Methods...
March 27, 2022
·
10:09 PM