and Security

Results: 171768



#Item
1Cryptography / Transport Layer Security / Secure communication / E-commerce / Cryptographic protocols / Internet security / HTTPS / POODLE / Cipher suite / RC4 / Public key certificate / Certificate authority

Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 11:54:40
2Computing / Internet / Statistical classification / Free software / Dark web / Secure communication / Tor / Relay / K-nearest neighbors algorithm / Outline of machine learning / Bandwidth / .tor

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 19:28:54
3Identification / Computing / Cryptography / Security engineering / Touchscreens / Multi-touch / Biometrics / Gesture / Authentication / Support vector machine / Shoulder surfing / Tablet computer

Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:59
4Computing / Software engineering / Computer programming / Object-oriented programming languages / Programming languages / Static program analysis / Software testing / Control flow / Static single assignment form / Call graph / Program analysis / Recursion

2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University

Add to Reading List

Source URL: mxia.me

Language: English - Date: 2017-02-08 07:01:32
5

Finding and Preventing Bugs in JavaScript Bindings Fraser Brown⋆ Dawson Engler⋆ ⋆ Shravan Narayan†

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:08
    6Software development / Software project management / Agile software development / United States Department of Homeland Security / Capability Maturity Model Integration / Agile / Scaled agile framework / Software development process

    DEPARTMENT OF HOMELAND SECURITY AWARDS OCTO CONSULTING GROUP $300M CEILING SERVICES ENABLING AGILE DELIVERY (SEAD) BPA CONTRACT Octo will deliver Agile and DevOps practices through embedded experts to expedite the agency

    Add to Reading List

    Source URL: www.octoconsulting.com

    Language: English - Date: 2018-08-27 12:37:57
    7

    Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:45
      8Cryptography / Computer security / Cryptographic hash functions / Password / Rainbow table / SHA-2 / Password strength / Salt

      EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:20
      9World Wide Web / Digital marketing / Internet search engines / Search engine optimization / Spamming / HTML / Meta element / Google Search / Reserved word / Spamdexing / Baidu / AdWords

      How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy Hao Yang1 , Xiulin Ma1 , Kun Du1 , Zhou Li2 , Haixin Duan1* , Xiaodong Su3 , Guang Liu3 , Zhifeng Gen

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:58:24
      10Economy / Finance / Money / Corporate finance / Entrepreneurship / Equity securities / Stock market / Private equity / Venture capital / Crowdfunding / Investor / Security

      BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs WHITEPAPER Q4 2018 AUTHORS D. ACHOUR, L. ALDOORY, H. KHOURY,

      Add to Reading List

      Source URL: www.kambio.io

      Language: English - Date: 2018-10-18 01:47:10
      UPDATE