Security

Results: 374843



#Item
191Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:12
192Cryptography / Data Encryption Standard / Linear cryptanalysis / Differential cryptanalysis / Block cipher / Salsa20 / Cryptanalysis / Differential-linear attack / NC / Boomerang attack / Stream cipher / E0

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
193Politics of the European Union / European Union / Foreign relations of the European Union / Military / Common Security and Defence Policy / European External Action Service / Military Planning and Conduct Capability / EU Battlegroup / European Defence Agency / Permanent Structured Cooperation / Committee for Civilian Aspects of Crisis Management / High Representative of the Union for Foreign Affairs and Security Policy

Implementation Plan on Security and Defence Building on the EU Global Strategy for foreign and security Policy put forward in June 2016, High Representative/ Vice-President Federica Mogherini presented in November 2016 a

Add to Reading List

Source URL: eeas.europa.eu

Language: English - Date: 2018-03-06 03:09:25
194Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 10:57:28
195Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-25 08:06:46
196Computer access control / Computer security / Identity management / Federated identity / Cloud standards / OAuth / Identity provider / OpenID / Single sign-on / Authentication / Relying party / SAML-based products and services

A Comprehensive Formal Security Analysis of OAuth 2.0 arXiv:1601.01229v3 [cs.CR] 27 MayDaniel Fett

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-06-14 12:33:34
197Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 03:19:52
198Cryptography / Prevention / Security engineering / Information governance / Crime prevention / National security / E-commerce / ISO/IEC 27001 / Management system / Information security / Kitemark / Public key certificate

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: CAIXABANK Av. Diagonal, T1P5

Add to Reading List

Source URL: www.caixabank.es

Language: English - Date: 2016-08-02 02:52:47
199Economy / Finance / Money / Corporate finance / Entrepreneurship / Equity securities / Stock market / Private equity / Venture capital / Crowdfunding / Investor / Security

BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs WHITEPAPER Q4 2018 AUTHORS D. ACHOUR, L. ALDOORY, H. KHOURY,

Add to Reading List

Source URL: kambio.io

Language: English - Date: 2018-10-18 01:47:10
200Agenda-setting theory / Framing / News media / Geography of Europe / Neuroscience / Salience / Cognitive science / Abkhazia

When Does the Public Care? Salience of Security Policy to the Public Caitlin McCulloch University of Maryland, College Park

Add to Reading List

Source URL: www.saramitchell.org

Language: English - Date: 2018-10-19 14:27:17
UPDATE