Security

Results: 374843



#Item
121Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning Payap Sirinam Mohsen Imani

Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning Payap Sirinam Mohsen Imani

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 06:14:58
122NPPA PRIVACY POLICY NPP Australia Limited (NPPA) is committed to protecting and maintaining the privacy, accuracy and security of an individual’s personal information. This Privacy Policy describes how NPPA manages the

NPPA PRIVACY POLICY NPP Australia Limited (NPPA) is committed to protecting and maintaining the privacy, accuracy and security of an individual’s personal information. This Privacy Policy describes how NPPA manages the

Add to Reading List

Source URL: www.nppa.com.au

Language: English - Date: 2018-02-26 22:05:21
123SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:55
124Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias  Bryan Ford

Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias Bryan Ford

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 19:45:56
125Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

Add to Reading List

Source URL: s3-ap-southeast-1.amazonaws.com

Language: English - Date: 2018-10-12 03:26:38
126Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu  Ab

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
127*  The speed of containers, the security of VMs katacontainers.io  2018 Launchpad Goals

* The speed of containers, the security of VMs katacontainers.io 2018 Launchpad Goals

Add to Reading List

Source URL: katacontainers.io

Language: English - Date: 2018-05-10 15:50:19
128Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe, University of California, Berkeley; Adrienne Porter Felt, Google, Inc. This paper is included in the Proceedings

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe, University of California, Berkeley; Adrienne Porter Felt, Google, Inc. This paper is included in the Proceedings

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2013-09-28 11:40:42
129Security concept: Lock on digital screen

Security concept: Lock on digital screen

Add to Reading List

Source URL: nis-summer-school.enisa.europa.eu

Language: English - Date: 2018-10-01 09:10:11
130IVD :  Automatic Learning and Enforcement of Authorization Rules in Online Social Networks Paul Marinescu† , Chad Parry† , Marjori Pomarole† , Yuan Tian‡ , Patrick Tague‡ , Ioannis Papagiannis† † Facebook.

IVD : Automatic Learning and Enforcement of Authorization Rules in Online Social Networks Paul Marinescu† , Chad Parry† , Marjori Pomarole† , Yuan Tian‡ , Patrick Tague‡ , Ioannis Papagiannis† † Facebook.

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:46