Добірка наукової літератури з теми "Lockpicking"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Lockpicking".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Lockpicking"

1

Garcia, Flavio D., Gerhard de Koning Gans, and Roel Verdult. "Wirelessly lockpicking a smart card reader." International Journal of Information Security 13, no. 5 (April 2, 2014): 403–20. http://dx.doi.org/10.1007/s10207-014-0234-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Wibisono, Arya, and MB Nugraha. "Passive Keyless Entry Locking Door With ESP32." Ultima Computing : Jurnal Sistem Komputer 12, no. 1 (July 2, 2020): 9–12. http://dx.doi.org/10.31937/sk.v12i1.1613.

Повний текст джерела
Анотація:
pada jaman modern ini, teknologi semakin canggih dan bisa digunakan oleh siapa saja, contohnya adalah lockpicking yang alatnya dapat dibeli oleh siapa saja dan mudah untuk dipelajari. Oleh karena itu, kunci fisik semakin kuno dan mudah untuk dibobol oleh siapa saja. Dengan menerapkan sistem passive keyless entry yang sudah diterapkan pada mobil jaman sekarang, menambah keamanan dan kenyamanan dari pengguna mobil tersebut. sistem itu kita coba terapkan pada ESP32 dan membuat kunci digital walaupun pada penilitian ini masih kurang pada sistem keamanan kartu menggunakan digital signature algorithm, sistem passive keyless entry berjalan dengan sesuai harapan dengan menggunakan RFID sebagai input pengenal dari UID masing – masing kartu RFID yang dianggap unik dan mudah untuk digunakan.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ramesh, Soundarya, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, and Jun Han. "Listen to your key: Towards acoustics-based physical key inference." Journal of the Acoustical Society of America 155, no. 3_Supplement (March 1, 2024): A69. http://dx.doi.org/10.1121/10.0026832.

Повний текст джерела
Анотація:
Physical locks are one of the most prevalent mechanisms for securing objects such as doors. While many of these locks are vulnerable to lock-picking, they are still widely used as lock-picking requires specific training with tailored instruments and easily raises suspicion. To overcome the limitations of lockpicking, we propose a novel attack vector that leverages the audio recording of the key insertion in order to infer the shape of victim’s key, namely, bittings (or cut depths) which form the secret of a key. In particular, we show that computing the timing interval between audible click sounds that occur during key insertion enables inferring the bitting information, i.e., shape of the physical key. Such an audio-based attack has several advantages—unlike lock-picking, it minimizes the attacker’s physical access to the lock, thus reducing the risks of them being apprehended. Second, as the attack only requires a microphone to launch the attack (e.g., a smartphone microphone), it significantly lowers the bar for the required expertise of the attacker. Despite the advantages, there are several challenges in extracting the required key-related signal from the audio. In this talk, we will discuss how we overcome the challenges and present initial results depicting the feasibility of audio-based key inference. This talk is based on two conference papers submitted to ACM HotMobile 2020 and USENIX Security 2021 on the same topic.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Dunham, Ian. "FACELESS YOUTUBERS: HOW CONTENT CREATORS SHAPE AUDIENCE EXPECTATIONS." AoIR Selected Papers of Internet Research, October 5, 2020. http://dx.doi.org/10.5210/spir.v2020i0.11205.

Повний текст джерела
Анотація:
YouTube's maturation as a platform can be seen through a collection of social norms, audience expectations, and politics, all of which weave themselves into the technosocial fabric of digital life. As such, certain practices that regulate the flow of information have become normalized across a certain subset of YouTube channels. This paper will look at this practice among YouTubers that are “faceless”—content creators who do not reveal their faces on camera while voluntarily revealing many other aspects of their identity. Specifically, a content analysis is performed on these channels: The Lockpicking Lawyer, AvE, SteadyCraftin, This Old Tony, bigclivedotcom, CGP Grey, and fastASMR. The wide range of categories these channels belong to (DIY, self help, science and technology, home crafting, electrical appliance teardown, and audio therapy) indicates that choosing to remain faceless is not a function of a certain type of material, but rather a salient trend that crosscuts YouTube genres. The channels analyzed suggest that these YouTubers feel empowered through remaining faceless, allowing for increased disclosure about the topic at hand. They also demonstrate that Faceless YouTubers selectively share information depending on a range of motivations, all of which revolve around imparting meaningful content to specific audiences while maintaining a specifically-constructed notion of privacy. As a platform that is continually evolving,this paper represents an advance in the study of YouTube.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Lockpicking"

1

United States. Central Intelligence Agency. The CIA lockpicking manual. New York, NY: Skyhorse, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

James, J. D. Locks & lockpicking: A basic guide for law enforcement, security, military : how locks work and how-to pick them. Hermosa Beach, CA: R & R Pub., 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

GUERRERO, Nathan. Tactical Lockpicking: The Tactical Approach to Strategic Lockpicking. Independently Published, 2021.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Agency, Central Intelligence. CIA Lockpicking Manual. Skyhorse Publishing Company, Incorporated, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cia Lockpicking Manual. Skyhorse Publishing Company, Incorporated, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

AMELIA, Susan. Diy Lockpicking: Everything You Need to Know about Lockpicking. Independently Published, 2021.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

MORENO, Johnny. Lockpicking Made Easy: The Complete Guide Book to Lockpicking with Ease. Independently Published, 2021.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Journals, Novalia. Sorry I'm Late I Was Lockpicking: Journal Funny Gift for Lockpicking Enthusiasts. Independently Published, 2020.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

HAYES, Robert. Lockpicking for Beginners: Everything the Beginner Needs to Get Started with Lockpicking Tactics and Tricks. Independently Published, 2021.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Easy Pickings: A self teaching manual in the technique of lockpicking. New Jersey, USA: Beckman Associates Int, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Lockpicking"

1

Oswald, David, Daehyun Strobel, Falk Schellenberg, Timo Kasper, and Christof Paar. "When Reverse-Engineering Meets Side-Channel Analysis – Digital Lockpicking in Practice." In Selected Areas in Cryptography -- SAC 2013, 571–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43414-7_29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Martinho-Truswell, Antone. "PARROTS IN THE MIRROR." In The Parrot in the Mirror, 152–84. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780198846109.003.0007.

Повний текст джерела
Анотація:
Abstract This chapter focuses on parrots, looking at three groups that exemplify convergent evolution—and parallel history—with humans: the cockatoos, the grey parrots, and the macaws. Like humans, they represent the extreme edge of what it means to be a parrot, the case where all the evolutionary forces combined to push a species or group of species towards an extreme version of its type. What is remarkable is that these two extreme groups of animals, the humans and the urparrots, have, in their extremity, become so remarkably similar. Rather than each being pushed to opposite ends of what it means to be an animal, they have ended up mirror images of each other, with parrots a whispered answer to the question: what if a different group of animals were to evolve like the humans? The chapter then considers the similarities that humans share with parrots, including longevity and monogamy. Where the parrots truly become our mirror image, however, is in their brains and their language. They share with us learning, fretfulness, personality, and artistry. Laboratory research has confirmed the expert lockpicking ability of these birds as well.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Lockpicking"

1

Steinmetzer, Daniel, Matthias Schulz, and Matthias Hollick. "Lockpicking physical layer key exchange." In WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2766498.2766514.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії