Security

Results: 374843



#Item
211Symbol / Constructible universe

Security in a Model for Long–running Transactions⋆ Damas P. Gruska1 , Andrea Maggiolo–Schettini2, and Paolo Milazzo2 1 2

Add to Reading List

Source URL: pages.di.unipi.it

Language: English - Date: 2015-12-18 06:55:14
212Government / Law / Terms of service / Privacy / Freedom of Information Act / Privacy Impact Assessment / United States Department of Homeland Security / Marc Rotenberg / Internet privacy / United States Census / Electronic Privacy Information Center

October 2, 2018 The Honorable Ron Johnson, Chairman The Honorable Claire McCaskill, Ranking Member U.S. Senate Committee on Homeland Security & Government Affairs 340 Dirksen Senate Office Building Washington, DC 20510

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2018-10-02 21:04:19
213Botnets / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Concurrent computing / Domain generation algorithm / Srizbi botnet / Hidden Markov model / Cutwail botnet

1 Poster: Zero-day Botnet Domain Generation Algorithm (DGA) Detection using Hidden Markov Models (HMMs) Yu Fu, Lu Yu, Richard Brooks Senior Member, IEEE

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 00:02:48
214Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Add to Reading List

Source URL: eftychis.org

Language: English - Date: 2018-02-16 15:03:09
215Algebra / Mathematics / Polynomials / Computer algebra / Integer factorization algorithms / Finite fields / Special number field sieve / General number field sieve / Irreducible polynomial / Discrete logarithm / Factorization / Resultant

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
216Computing / Cryptography / Internet / Internet protocols / Computer access control / Internet Standards / Cryptographic protocols / Time-based One-time Password algorithm / Password / Salted Challenge Response Authentication Mechanism / Yahoo! Messenger Protocol

A Single-Sign-On Security Platform for Private and Decentralized Applications William Swanson, Paul Puey The Edge platform (formerly Airbitz) implements a client-side encrypted, peer-to-peer synchronized, and backed up d

Add to Reading List

Source URL: edge.app

Language: English - Date: 2018-09-12 15:47:22
217Cryptography / NIST hash function competition / SIMD / ARM architecture / Cryptographic hash function / SHA-3 / Data Encryption Standard / Block cipher

Introduction Description Security

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
218Economy / Finance / Money / Financial markets / Investment banking / Security / Initial coin offering / Secondary market

SharesPost Announces Strategic Partnership with Leading Blockchain Advisory Firm Satis Group Partnership will provide security token issuers with streamlined access to secondary trading and advisory services San Francisc

Add to Reading List

Source URL: d2wbqcispjulqi.cloudfront.net

Language: English - Date: 2018-09-05 18:55:16
219Philosophy / Epistemology / Philosophy of science / Epistemology of science / Analytic philosophy / Scientific method / Falsifiability / Science / Hypothetico-deductive model / Scientific theory / Occam's razor / Theory

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:01
220Information / Data management / Computing / Cryptography / Big data / Technology forecasting / Transaction processing / Differential Privacy / Data retention / Internet privacy / Geographic information system / Privacy

Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization Mathias Lecuyer∗1 , Riley Spahn∗1 , Roxana Geambasu1 , Tzu-Kuo Huang†2 , and Siddhartha Sen3 1 Columbia University, 2 Uber Advanced Tec

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:30
UPDATE