vulnerability research vulnerability disclosure information security game theory zero-day intelligence law enforcement ethics governance national security trust elliptic-curve cryptography tls cryptographic backdoor pki security economics networks punishment wassenaar arrangement market trade 0day exploit cooperation extortion network security embedded systems key management operating systems software development metrics cryptanalysis microarchitectural attacks microarchitectures dependability malware duda cryptography fault attacks software security security information assurance strategy networking authentication integrity confidentiality impersonation eavesdropping tampering key generation elligator cross-certification assurance rsa ca backdoor
Mehr anzeigen