and Security

Results: 171768



#Item
91Politics of the European Union / European Union / Foreign relations of the European Union / Military / Common Security and Defence Policy / European External Action Service / Military Planning and Conduct Capability / EU Battlegroup / European Defence Agency / Permanent Structured Cooperation / Committee for Civilian Aspects of Crisis Management / High Representative of the Union for Foreign Affairs and Security Policy

Implementation Plan on Security and Defence Building on the EU Global Strategy for foreign and security Policy put forward in June 2016, High Representative/ Vice-President Federica Mogherini presented in November 2016 a

Add to Reading List

Source URL: eeas.europa.eu

Language: English - Date: 2018-03-06 03:09:25
92Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 10:57:28
93Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-25 08:06:46
94Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 03:19:52
95Economy / Finance / Money / Corporate finance / Entrepreneurship / Equity securities / Stock market / Private equity / Venture capital / Crowdfunding / Investor / Security

BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs WHITEPAPER Q4 2018 AUTHORS D. ACHOUR, L. ALDOORY, H. KHOURY,

Add to Reading List

Source URL: kambio.io

Language: English - Date: 2018-10-18 01:47:10
96Mathematics / Theoretical computer science / Constraint programming / Functions and mappings / Electronic design automation / Logic in computer science / NP-complete problems / Satisfiability modulo theories / Rounding / Limit of a function / Function

Real Behavior of Floating Point Numbers * Bruno Marre1 , Fran¸cois Bobot1 , and Zakaria Chihani1 CEA LIST, Software Security Lab, Gif-sur-Yvette, France

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
97Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 00:24:54
98Economy / Finance / Money / Investment / Financial markets / Financial law / Bond market / Investment management / Financial risk / Bond / Asset classes / Portfolio

Capital gain and preservation of capital in an uncertain environment In a world where many security valuations are stretched and the volatility regime is shifting, wealth managers are challenged to put together portfolio

Add to Reading List

Source URL: www.fundexpertsforum.com

Language: English - Date: 2018-05-29 09:59:01
99Algebra / Abstract algebra / Pairing-based cryptography / Mathematics / Group theory / Linear algebra / Module theory / Pairing / Weil pairing / Elliptic curve / Proofs of quadratic reciprocity / Basic hypergeometric series

Implementing Pairings at the 192-bit Security Level Diego F. Aranha1 , Laura Fuentes-Casta˜ neda2 , Edward Knapp3 , Alfred 3 Menezes , and Francisco Rodr´ıguez-Henr´ıquez2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-25 16:25:57
100Computing / Network architecture / Emerging technologies / Information and communications technology / Configuration management / Software-defined networking / Ethernet / OpenFlow / Computer architecture / Access control / Computer network / Network interface controller

Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 21:01:36
UPDATE