and Security

Results: 171768



#Item
61Terms of service / Software / Computing / Technology / Social networking services / Microblogging / Real-time web / Text messaging / Twitter / Privacy / Internet privacy / Medical privacy

Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 01:15:34
62Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Malleability / Message authentication code / Paillier cryptosystem / RSA / Digital signature

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
63Computing / Computer security / Internet security / Information Age / Information and communications technology / HackerOne / Computer viruses / Bug bounty program / Hacker culture / Security hacker / Hacker / Katie Moussouris

ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-21 12:07:31
64Computing / Computer architecture / System software / Recall / Android / Pattern / Short-term memory / Student's t-test

SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:19
65Sponsor / Value-added tax / TED / Culture / Terminology / Human behavior

DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

Add to Reading List

Source URL: itsec.cs.uni-bonn.de

Language: English - Date: 2017-04-24 03:56:14
66Computing / Data security / Computer security / Internet privacy / Digital rights / Human rights / Terms of service / Law / Privacy / Information privacy / Information security / Proxy

Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 05:23:56
67Computing / Prevention / Security engineering / Computer security / Data security / Crime prevention / Cryptography / National security / Information technology audit / Audit / Internal control / Database security

State Corporation Commission - Audit of Information Security and Travel and Small Purchase Charge Card Expenses for the year ended June 30, 2017

Add to Reading List

Source URL: www.apa.virginia.gov

Language: English - Date: 2018-10-25 10:47:54
68Technology / Terms of service / Social networking services / Digital media / Law / Internet privacy / Children's Online Privacy Protection Act / Social networks / Privacy / World Wide Web / Computer network / Privacy concerns with social networking services

Area 3 (Security and Privacy) Danny Yoo () Abstract Imagine you are designing a Web-based system that enables sharing and communication between users who are as young as ten years of age. What are the secu

Add to Reading List

Source URL: www.hashcollision.org

Language: English
69

On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
    70Domain name system / Internet / Cryptography / Computing / Domain Name System Security Extensions / Sender Policy Framework / DNS-based Authentication of Named Entities / DMARC / Name server / Extension mechanisms for DNS / DNS root zone / Email authentication

    Short Paper: On Deployment of DNS-based Security Enhancements Pawel Szalachowski and Adrian Perrig ETH Zurich, Switzerland Abstract. Although the Domain Name System (DNS) was designed as a naming

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    UPDATE