and Security

Results: 171768



#Item
11Cryptography / Computational complexity theory / Complexity classes / Cryptographic protocols / Non-interactive zero-knowledge proof / Interactive proof system / Proof of knowledge / Zero-knowledge proof / NP / Zero knowledge / IP / Soundness

ZKProof Standards Security Track Proceedings 1 August 2018 + subsequent revisions This document is an ongoing work in progress. Feedback and contributions are encouraged. Track chairs:​​

Add to Reading List

Source URL: zkproof.org

Language: English - Date: 2018-10-25 10:32:39
12Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
13Cryptography / Secure communication / Message authentication codes / Transport Layer Security / Cryptographic protocols / Internet Standards / Cipher suite / Authenticated encryption / Poly1305 / Galois/Counter Mode / OpenSSL / Key generation

Implementing and Proving the TLS 1.3 Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin Microsoft Research {antdl,fournet

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:36
14Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Add to Reading List

Source URL: cohney.info

Language: English - Date: 2018-09-29 19:30:48
15Economy / Financial markets / Finance / Money / Security / Initial coin offering / Securities market / Secondary market / Algorithmic trading / Securitization

SharesPost and Securitize Announce Partnership to Facilitate Listing of Security Tokens Securitize issuers now able to list security tokens on SharesPost platform, increasing liquidity and access San Francisco, CA – Au

Add to Reading List

Source URL: d2wbqcispjulqi.cloudfront.net

Language: English - Date: 2018-09-05 18:55:16
16Cybercrime / Computer network security / Cyberwarfare / Computing / Spamming / Malware / Domain generation algorithm / Botnet / Web threat / Blacklist

A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever† , Platon Kotzias∗ , Davide Balzarotti∓ , Juan Caballero∗ , Manos Antonakakis‡ {chazlever,manos}@gatech.edu, davide.balzarotti@eurec

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:17
17Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-30 18:44:12
18Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
19Taxation in the United States / Tax / Tax forms / Cisco Systems / Deep packet inspection / Videotelephony / Value-added tax / IRS tax forms / Internal Revenue Service

CASE STUDY Increased security and availability for the Slovak Tax Directorate´s portal

Add to Reading List

Source URL: www.soitron.com

Language: English - Date: 2018-01-15 09:55:34
20Domain name system / Internet / Internet Standards / Network architecture / Computing / Domain Name System Security Extensions / Name server / Domain name / Root name server / WHOIS / Fully qualified domain name / Second-level domain

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
UPDATE