Security

Results: 374843



#Item
141Machine learning / Learning / Artificial intelligence / Covariance and correlation / Data analysis / Dimension reduction / Anomaly detection / Data mining / Data security / Principal component analysis / Pearson correlation coefficient / Correlation and dependence

SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
142Sponsor / Value-added tax / TED / Culture / Terminology / Human behavior

DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

Add to Reading List

Source URL: itsec.cs.uni-bonn.de

Language: English - Date: 2017-04-24 03:56:14
143Computing / Data security / Computer security / Internet privacy / Digital rights / Human rights / Terms of service / Law / Privacy / Information privacy / Information security / Proxy

Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 05:23:56
144Computing / Prevention / Security engineering / Computer security / Data security / Crime prevention / Cryptography / National security / Information technology audit / Audit / Internal control / Database security

State Corporation Commission - Audit of Information Security and Travel and Small Purchase Charge Card Expenses for the year ended June 30, 2017

Add to Reading List

Source URL: www.apa.virginia.gov

Language: English - Date: 2018-10-25 10:47:54
145Technology / Terms of service / Social networking services / Digital media / Law / Internet privacy / Children's Online Privacy Protection Act / Social networks / Privacy / World Wide Web / Computer network / Privacy concerns with social networking services

Area 3 (Security and Privacy) Danny Yoo () Abstract Imagine you are designing a Web-based system that enables sharing and communication between users who are as young as ten years of age. What are the secu

Add to Reading List

Source URL: www.hashcollision.org

Language: English
146

On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
    147Computer access control / Computer security / Identity management / Identity / Federated identity / Single sign-on / Identity provider / Multi-factor authentication / Security Assertion Markup Language / OAuth / Password management / Integrated Windows Authentication

    Application Security—Made in Switzerland Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is underpinned by

    Add to Reading List

    Source URL: www.airlock.com

    Language: English - Date: 2016-09-15 09:49:08
    148Domain name system / Internet / Cryptography / Computing / Domain Name System Security Extensions / Sender Policy Framework / DNS-based Authentication of Named Entities / DMARC / Name server / Extension mechanisms for DNS / DNS root zone / Email authentication

    Short Paper: On Deployment of DNS-based Security Enhancements Pawel Szalachowski and Adrian Perrig ETH Zurich, Switzerland Abstract. Although the Domain Name System (DNS) was designed as a naming

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    149Cryptography / Transport Layer Security / Public key infrastructure / Public-key cryptography / Cryptographic protocols / Key management / Online Certificate Status Protocol / Certificate revocation list / X.509 / Certificate authority / OCSP stapling / Public key certificate

    CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers James Larisch∗ Bruce M. Maggs‡ ∗ Northeastern

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:42
    150Cryptography / Randomness / Publicly Verifiable Secret Sharing / Clientserver model / Entropy / Server / Lag / Key / Secret sharing

    PDF Document

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-21 15:09:36
    UPDATE