Security

Results: 374843



#Item
81Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
82Modeling and simulation / Multi-agent systems / Simulation / Artificial intelligence / Systems science / Model checking / Agent-based model / Economic model / Intelligent agent / MAS

Model Checking Multiagent Systems MAS for Security Multiagent System-based Verification of Security and Privacy

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:29:18
83United States / Paperwork Reduction Act / Human behavior / African Growth and Opportunity Act / Federal Aviation Administration / Transport / Airport / September 11 attacks / United States Department of Transportation

Federal Register / Vol. 66, NoMonday, March 12, Notices institution. The respondents are Social Security beneficiaries who use the Internet to enroll in DD/EFT. Number of Respondents: 3,485. Frequency of Re

Add to Reading List

Source URL: 34.232.160.87

Language: English - Date: 2017-07-06 11:25:58
84Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
85Denial-of-service attacks / Statistical inference / Cyberwarfare / Estimation theory / Computing / Denial-of-service attack / Internet Relay Chat / Domain name system / Anycast / Cross-validation / Regression analysis / Prediction

Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-27 07:43:28
86

SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security Hamed Haddadi∗ , Vassilis Christophides† , Renata Teixeira† , Kenjiro Cho‡ , Shigeya Suzuki§ , Adrian Perrig¶ ∗ Imperial College London

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
    87Cryptography / Advanced Encryption Standard / Data Encryption Standard / AES implementations / ARM architecture / Block ciphers / DEAL / AES instruction set / CRYPTON

    All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands ,

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-02-09 07:40:08
    88Computing / Software engineering / Computer programming / Software bugs / Software testing / Computer network security / Debuggers / Common Weakness Enumeration / Memory debugger / Memory safety / Application security / Frama-C

    Detection of Security Vulnerabilities in C Code using Runtime Verification: an Experience Report Kostyantyn Vorobyov, Nikolai Kosmatov, and Julien Signoles CEA, LIST, Software Reliability and Security Laboratory, PC 174,

    Add to Reading List

    Source URL: julien.signoles.free.fr

    Language: English - Date: 2018-06-20 05:46:32
    89Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

    Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 06:46:30
    90Algebra / Mathematics / Linear algebra / Matrices / Matrix theory / Abstract algebra / Coding theory / Trace / Circulant matrix / Square matrix / Matrix / Row and column spaces

    Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-03-09 10:10:48
    UPDATE