1:04:01 Defense and Offense Technologies in 2016 Which Side will Make a Breakthrough All Hacking Cons
52:53 Exploiting Redundancy Properties of Malicious Infrastructure for Incident Detection All Hacking Cons
26:03 If You Find One, There are Probably More A Detection Method of Reproduced Vulnerability All Hacking Cons
1:51:50 Another Round of the Standoff IS Services as a Response to New Threats and Challenges All Hacking Cons
10:16 Integration of Quantum Keys into Data Encryption Algorithms in a Russian Telecom Network All Hacking Cons
13:01 Development and Implementation of HMAC in the Frame of the White Box Cryptography Model All Hacking Cons
10:14 Development of Public Key Cryptosystems Based on a Generalized Knapsack Problem All Hacking Cons