and Security

Results: 171768



#Item
111Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-21 15:07:31
112Computer architecture / Robotics / Computing / Industrial robot / Robot / Humanrobot interaction / Comau / Cobot / VxWorks / Robot software / Mobile robot

An Experimental Security Analysis of an Industrial Robot Controller Davide Quarta∗ , Marcello Pogliani∗ , Mario Polino∗ , Federico Maggi∗† , Andrea Maria Zanchettin∗ , and Stefano Zanero∗ ∗ Dipartimento

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:59
113Politics of the European Union / European Union / Politics of Europe / Foreign relations of the European Union / Common Security and Defence Policy / Common Foreign and Security Policy / Federica Mogherini / Coordinated Annual Review on Defence / Permanent Structured Cooperation / Military Planning and Conduct Capability / High Representative of the Union for Foreign Affairs and Security Policy / Military Mobility

Timeline: European cooperation in the area of security and defence We are seeing a historic moment in European defence.

Add to Reading List

Source URL: cdn4-eeas.fpfis.tech.ec.europa.eu

Language: English
114Mathematical analysis / Mathematics / Post-quantum cryptography / Number theory / Measure theory / Cryptography / Algebra / Distribution / Support / Learning with errors / Weight / KullbackLeibler divergence

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-25 03:26:11
115Gay-friendly / Industrial and organizational psychology / Regeneron Science Talent Search

Crimes Reported to the Police and Campus Security AuthoritiesStatistics in the following table are based upon the definitions stated in the reauthorizations of the Higher Education Opportunity Act and Violen

Add to Reading List

Source URL: police.stanford.edu

Language: English - Date: 2018-10-24 11:19:52
116Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
117Human behavior / Human sexuality / Violence / Sexual ethics / Sexual abuse / Sex crimes / Rape / Sexual violence / Campus sexual assault / Sexual harassment / Clery Act / Sexual assault

Annual Security and Annual Fire Safety ReportAnnual Security and Annual Fire Safety Report 2018

Add to Reading List

Source URL: clery.emory.edu

Language: English - Date: 2018-09-28 16:34:06
118Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
119Programming language implementation / Software / Computer programming / Compiler construction / Compiler optimizations / Compilers / Register allocation / Instruction set architectures / LLVM / Optimizing compiler / Static single assignment form / GNU Compiler Collection

Instruction Scheduling and Register Allocation on ARM Cortex-M Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:40:08
120Algebra / Mathematics / Abstract algebra / Algebraic geometry / Commutative algebra / Asymptotic analysis / Mathematical series / Grbner basis / Invariant theory / Generating function / Big O notation / Hilbert series and Hilbert polynomial

LNCSOn Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:40
UPDATE