and Security

Results: 171768



#Item
101Computer network security / Security engineering / Computing / Cyberwarfare / Honeypot / Spamming / Robotics / Robot / Cyber-physical system / Computer security / Client honeypot

1 Poster: HoneyBot- A Honeypot for Robotic Systems Celine Irvene, Member, IEEE, David Formby, Member, IEEE, Sam Litchfield, Member, IEEE, and Raheem Beyah, Senior Member, IEEE

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-07 21:48:38
102Symbol / Constructible universe

Security in a Model for Long–running Transactions⋆ Damas P. Gruska1 , Andrea Maggiolo–Schettini2, and Paolo Milazzo2 1 2

Add to Reading List

Source URL: pages.di.unipi.it

Language: English - Date: 2015-12-18 06:55:14
103Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Add to Reading List

Source URL: eftychis.org

Language: English - Date: 2018-02-16 15:03:09
104Algebra / Mathematics / Polynomials / Computer algebra / Integer factorization algorithms / Finite fields / Special number field sieve / General number field sieve / Irreducible polynomial / Discrete logarithm / Factorization / Resultant

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
105Computing / Cryptography / Internet / Internet protocols / Computer access control / Internet Standards / Cryptographic protocols / Time-based One-time Password algorithm / Password / Salted Challenge Response Authentication Mechanism / Yahoo! Messenger Protocol

A Single-Sign-On Security Platform for Private and Decentralized Applications William Swanson, Paul Puey The Edge platform (formerly Airbitz) implements a client-side encrypted, peer-to-peer synchronized, and backed up d

Add to Reading List

Source URL: edge.app

Language: English - Date: 2018-09-12 15:47:22
106Economy / Finance / Money / Financial markets / Investment banking / Security / Initial coin offering / Secondary market

SharesPost Announces Strategic Partnership with Leading Blockchain Advisory Firm Satis Group Partnership will provide security token issuers with streamlined access to secondary trading and advisory services San Francisc

Add to Reading List

Source URL: d2wbqcispjulqi.cloudfront.net

Language: English - Date: 2018-09-05 18:55:16
107Philosophy / Epistemology / Philosophy of science / Epistemology of science / Analytic philosophy / Scientific method / Falsifiability / Science / Hypothetico-deductive model / Scientific theory / Occam's razor / Theory

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:01
108Information / Data management / Computing / Cryptography / Big data / Technology forecasting / Transaction processing / Differential Privacy / Data retention / Internet privacy / Geographic information system / Privacy

Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization Mathias Lecuyer∗1 , Riley Spahn∗1 , Roxana Geambasu1 , Tzu-Kuo Huang†2 , and Siddhartha Sen3 1 Columbia University, 2 Uber Advanced Tec

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:30
109System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
110Military / International relations / Coordinated Annual Review on Defence / Military of the European Union / European Union Military Staff / European External Action Service / Common Security and Defence Policy / European Defence Agency / United Nations General Assembly observers / EDA / Permanent Structured Cooperation / NATO

Coordinated Annual Review on Defence (CARD) The EU Global Strategy (EUGS) presented in June 2016 by Federica Mogherini, the High Representative for Foreign Affairs and Security Policy/Vice-President of the Commission and

Add to Reading List

Source URL: eeas.europa.eu

Language: English - Date: 2017-12-11 11:58:17
UPDATE