Security

Results: 374843



#Item
1Cryptography / Computer security / Computer hardware / Cyberwarfare / ISO standards / Hardware Trojan / Hardware security module / Secure cryptoprocessor / Hardware security / Trusted Platform Module / Smart card

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Cryptography / Transport Layer Security / Secure communication / E-commerce / Cryptographic protocols / Internet security / HTTPS / POODLE / Cipher suite / RC4 / Public key certificate / Certificate authority

Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 11:54:40
3Economy / Labour law / Social programs / Welfare economics / Social justice / Unemployment / Yoy / Microeconomics / Labour economics / Economics / Workforce / Labour Party

Monthly Labour Economics Report for May 2016 Summary on Labour Economic Conditions Employment in the labour market for May 2016, showed employment of 10,347,954 workers in the social security system (Section 33), a 2.80

Add to Reading List

Source URL: www.mol.go.th

Language: English - Date: 2016-07-12 09:04:39
4Computing / Computer architecture / Android / System software / Online marketplaces / Google Play / Intent

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 07:38:02
5

CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees Thomas Bauereiß∗ , Armando Pesenti Gritti† , Andrei Popescu‡§ , Franco Raimondi‡ ∗ German Research Center for A

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:37
    6Computing / Internet / Statistical classification / Free software / Dark web / Secure communication / Tor / Relay / K-nearest neighbors algorithm / Outline of machine learning / Bandwidth / .tor

    Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 19:28:54
    7Finance / Economy / Money / Financial markets / Initial coin offering / Secondary market / Security / Broker-dealer / Algorithmic trading / Securities Exchange Act / Dark pool

    SharesPost Announces Launch of ATS for Secondary Trading of Security Tokens SharesPost expects security token exchange platform to be available in H2 2018 May 14, San Francisco, CA - SharesPost, a leading provider

    Add to Reading List

    Source URL: d2wbqcispjulqi.cloudfront.net

    Language: English - Date: 2018-09-05 18:55:16
    8Dark web / Computing / Internet / Secure communication / Cryptographic protocols / Information and communications technology / Fingerprinting algorithms / Tor / .onion / Internet privacy / Operation Onymous / Computer network

    Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-06-21 13:36:21
    9Identification / Computing / Cryptography / Security engineering / Touchscreens / Multi-touch / Biometrics / Gesture / Authentication / Support vector machine / Shoulder surfing / Tablet computer

    Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:59
    10Computing / Software engineering / Computer programming / Object-oriented programming languages / Programming languages / Static program analysis / Software testing / Control flow / Static single assignment form / Call graph / Program analysis / Recursion

    2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University

    Add to Reading List

    Source URL: mxia.me

    Language: English - Date: 2017-02-08 07:01:32
    UPDATE