Security

Results: 374843



#Item
111Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-05 12:06:50
112Philosophy / Epistemology / Philosophy of science / Epistemology of science / Analytic philosophy / Scientific method / Falsifiability / Science / Hypothetico-deductive model / Scientific theory / Occam's razor / Theory

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

Add to Reading List

Source URL: www.microsoft.com

Language: English - Date: 2018-01-04 02:56:22
113Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field

Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-06-09 02:13:24
114Computing / Software / System software / Computer network security / Wireless networking / IEEE 802.11 / Web scraping / Wireshark / Pcap / Aircrack-ng / Packet analyzer / Transmission Control Protocol

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
115Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:57:40
116Aircraft instruments / Avionics / Technology / Aviation / Computing / ACARS / ARINC / Data link / ICNS / Internet privacy / Privacy / Automatic dependent surveillance  broadcast

On the Security and Privacy of ACARS

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-04-23 04:28:21
117Artificial intelligence / World Wide Web / Human-based computation / Technology / Computer vision / Computer access control / Anti-spam / CAPTCHA / Computer security / Internet bot / Turing test / Transaction authentication number

Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 09:05:50
118Prevention / Security / Actuarial science / Safety / Security engineering / Risk analysis / Project management / Risk management / Risk / Security convergence / Professional certification / Computer security

1 ENTERPRISE SECURITY RISK MANAGEMENT Chapters and Councils

Add to Reading List

Source URL: www.asisitaly.org

Language: English - Date: 2018-05-14 11:49:16
119Computing / Cloud computing / Cloud infrastructure / Information and communications technology / Computer security / Cryptography / National security / Cloud computing security / Information security / Cloud computing issues / HP Cloud

2018 CLOUD SECURITY REPORT INTRODUCTION

Add to Reading List

Source URL: pages.cloudpassage.com

Language: English - Date: 2018-10-13 13:59:27
120Hashing / Error detection and correction / Information retrieval / Information science / Cryptographic hash functions / Cryptography / Cryptocurrencies / Merkle tree / Blockchain / Hash list / Bitcoin / Hash function

Chainweb Protocol Security Calculations Monica Quaintance, Will Martino, WORK IN PROGRESS - DRAFT v7

Add to Reading List

Source URL: kadena.io

Language: English - Date: 2018-05-11 18:40:04
UPDATE