and Security

Results: 171768



#Item
51Philosophy / Epistemology / Philosophy of science / Epistemology of science / Analytic philosophy / Scientific method / Falsifiability / Science / Hypothetico-deductive model / Scientific theory / Occam's razor / Theory

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

Add to Reading List

Source URL: www.microsoft.com

Language: English - Date: 2018-01-04 02:56:22
52Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field

Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-06-09 02:13:24
53Aircraft instruments / Avionics / Technology / Aviation / Computing / ACARS / ARINC / Data link / ICNS / Internet privacy / Privacy / Automatic dependent surveillance  broadcast

On the Security and Privacy of ACARS

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-04-23 04:28:21
54Artificial intelligence / World Wide Web / Human-based computation / Technology / Computer vision / Computer access control / Anti-spam / CAPTCHA / Computer security / Internet bot / Turing test / Transaction authentication number

Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 09:05:50
55Prevention / Security / Actuarial science / Safety / Security engineering / Risk analysis / Project management / Risk management / Risk / Security convergence / Professional certification / Computer security

1 ENTERPRISE SECURITY RISK MANAGEMENT Chapters and Councils

Add to Reading List

Source URL: www.asisitaly.org

Language: English - Date: 2018-05-14 11:49:16
56Law / Terms of service / Privacy law / Government / Information privacy / Privacy / Human rights / Medical privacy / Internet privacy / Office of the Australian Information Commissioner / Personally identifiable information / Personal Information Protection and Electronic Documents Act

NPPA PRIVACY POLICY NPP Australia Limited (NPPA) is committed to protecting and maintaining the privacy, accuracy and security of an individual’s personal information. This Privacy Policy describes how NPPA manages the

Add to Reading List

Source URL: www.nppa.com.au

Language: English - Date: 2018-02-26 22:05:21
57Data management / Computing / Data / Relational database management systems / Database theory / NoSQL / Structured storage / Database / NewSQL / Relational database / ODB / Conjunctive query

SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:55
58Cryptocurrencies / Alternative currencies / Economy / Money / Bitcoin / Blockchains / Computing / Decentralization / Ethereum / Digital currency / Proof-of-stake / Draft:Nihilo Blockchain Introduction

Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

Add to Reading List

Source URL: s3-ap-southeast-1.amazonaws.com

Language: English - Date: 2018-10-12 03:26:38
59Formal methods / Class / Class invariant / Invariant / Emmy Noether / Mathematics / Science and technology in Germany

IVD : Automatic Learning and Enforcement of Authorization Rules in Online Social Networks Paul Marinescu† , Chad Parry† , Marjori Pomarole† , Yuan Tian‡ , Patrick Tague‡ , Ioannis Papagiannis† † Facebook.

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:46
60Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
UPDATE