This entry was posted on Friday, July 17th, 2009 at 16:10 and is filed under Communications security, Networks, Random bits, Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Fill in your details below or click an icon to log in:
You are commenting using your WordPress.com account. ( Log Out / Change )
You are commenting using your Twitter account. ( Log Out / Change )
You are commenting using your Facebook account. ( Log Out / Change )
You are commenting using your Google+ account. ( Log Out / Change )
Connecting to %s
Notify me of follow-up comments via email.
Why Poissonian traffic models matter more now than ever, part 1 2 3 4 5 6
Common data sets and the illusion of scientific security testing
A minimal periodic coloring theorem part 1 2 3
Dynamical bias in the dice roll
The fundamental law of statistical physics
Jaynes and the Gibbs paradox
A graded lexicographic index, part 1 2 3
Solution of second-order matrix difference equations
Birds on a wire and the Ising model
The chimera of cyberdeterrence
Martingales from finite Markov processes, part 1
Initial software release
[All Equilibrium-related posts]
The Contempt Theme.
Blog at WordPress.com.
Get every new post delivered to your Inbox.