Security

Results: 374843



#Item
151System software / Software / Computing / Cloud infrastructure / Kubernetes / Operating-system-level virtualization / OpenStack / Virtual machine / Hyper-V / Hypervisor / Intermodal container

The speed of containers, the security of VMs Kata Containers is a novel implementation of a lightweight virtual machine that seamlessly integrates within the container ecosystem. Kata Containers are as light and fast as

Add to Reading List

Source URL: katacontainers.io

Language: English - Date: 2018-08-06 15:21:19
152Software / Computing / Free software / Web browsers / Cross-platform software / JavaScript / Web programming / Firefox / Cross-site scripting / Proxy server / Trusted computing base / Browser extension

Improving Web Privacy And Security with a Cost-Benefit Analysis of the Web API by Peter Snyder B.A., Lawrence University, 2006

Add to Reading List

Source URL: www.peteresnyder.com

Language: English - Date: 2018-06-29 22:01:44
153Computing / Android / Computer architecture / System software / Smartphones / Social engineering / IOS / Mach / Google Play / Clickjacking / Yo / Mobile security

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio Chenxiong Qian, Simon P. Chung, Wenke Lee

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:33
154Cryptography / Public-key cryptography / Cryptographic protocols / Key management / Public key infrastructure / DiffieHellman key exchange / Key exchange / Forward secrecy / RSA / Secure channel / XTR / Digital signature

A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:55:11
155Cryptography / NIST hash function competition / Cryptographic hash functions / MerkleDamgrd construction / SIMD / CubeHash / Hash function / SHA-3 / Block cipher

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Charles.Bouillaguet,Gaet

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
156Computing / Internet / Computer network security / Internet privacy / Information and communications technology / Transport Layer Security / Cryptographic protocols / Secure communication / HTTP cookie / HTTPS / Deep packet inspection / Man-in-the-middle attack

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
157

Security BSides Munich Konferenz Sponsoring Kit FrühlingMünchen, Deutschland www.bsidesmunich.org

Add to Reading List

Source URL: www.bsidesmunich.org

Language: German - Date: 2018-09-10 16:03:04
    158Military / Politics of the European Union / Europe / Foreign relations of the European Union / Federica Mogherini / Renzi Cabinet / Coordinated Annual Review on Defence / Common Security and Defence Policy / Permanent Structured Cooperation / High Representative of the Union for Foreign Affairs and Security Policy / European Union / Military Planning and Conduct Capability

    Timeline: European cooperation in the area of security and defence We are seeing a historic moment in European defence.

    Add to Reading List

    Source URL: eeas.europa.eu

    Language: English - Date: 2017-12-13 10:23:19
    159Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

    Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-11 13:01:38
    160Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

    Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-15 03:43:28
    UPDATE