Security

Results: 374843



#Item
231An Experimental Security Analysis of an Industrial Robot Controller Davide Quarta∗ , Marcello Pogliani∗ , Mario Polino∗ , Federico Maggi∗† , Andrea Maria Zanchettin∗ , and Stefano Zanero∗ ∗ Dipartimento

An Experimental Security Analysis of an Industrial Robot Controller Davide Quarta∗ , Marcello Pogliani∗ , Mario Polino∗ , Federico Maggi∗† , Andrea Maria Zanchettin∗ , and Stefano Zanero∗ ∗ Dipartimento

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:59
232Timeline:  European cooperation in the area of security and defence  We are seeing a historic moment in European defence.

Timeline: European cooperation in the area of security and defence We are seeing a historic moment in European defence.

Add to Reading List

Source URL: cdn4-eeas.fpfis.tech.ec.europa.eu

Language: English
233Protecting Bare-metal Embedded Systems With Privilege Overlays Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗ Pur

Protecting Bare-metal Embedded Systems With Privilege Overlays Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗ Pur

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:27
    234Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

    Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-02-25 03:26:11
    235Crimes Reported to the Police and Campus Security AuthoritiesStatistics in the following table are based upon the definitions stated in the reauthorizations of the Higher Education Opportunity Act and Violen

    Crimes Reported to the Police and Campus Security AuthoritiesStatistics in the following table are based upon the definitions stated in the reauthorizations of the Higher Education Opportunity Act and Violen

    Add to Reading List

    Source URL: police.stanford.edu

    Language: English - Date: 2018-10-24 11:19:52
    236CERTIFICATE OF REGISTRATION  Information Security Management System - ISO/IEC 27001:2013 The Certification Body of Schellman & Company, LLC hereby certifies that the following organization operates an Information Securit

    CERTIFICATE OF REGISTRATION Information Security Management System - ISO/IEC 27001:2013 The Certification Body of Schellman & Company, LLC hereby certifies that the following organization operates an Information Securit

    Add to Reading List

    Source URL: a.slack-edge.com

    Language: English - Date: 2018-06-26 14:09:55
    237Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

    Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

    Add to Reading List

    Source URL: www.ofirweisse.com

    Language: English - Date: 2018-10-17 09:19:20
    238Annual Security and Annual Fire Safety ReportAnnual Security and Annual Fire Safety Report 2018

    Annual Security and Annual Fire Safety ReportAnnual Security and Annual Fire Safety Report 2018

    Add to Reading List

    Source URL: clery.emory.edu

    Language: English - Date: 2018-09-28 16:34:06
    239Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

    Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:35
    240Federal Department of Home Affairs FDHA Federal Social Insurance Office FSIO International Affairs Social Security for Posted Workers

    Federal Department of Home Affairs FDHA Federal Social Insurance Office FSIO International Affairs Social Security for Posted Workers

    Add to Reading List

    Source URL: www.bsv.admin.ch

    Language: English