and Security

Results: 171768



#Item
71System software / Software / Computing / Cloud infrastructure / Kubernetes / Operating-system-level virtualization / OpenStack / Virtual machine / Hyper-V / Hypervisor / Intermodal container

The speed of containers, the security of VMs Kata Containers is a novel implementation of a lightweight virtual machine that seamlessly integrates within the container ecosystem. Kata Containers are as light and fast as

Add to Reading List

Source URL: katacontainers.io

Language: English - Date: 2018-08-06 15:21:19
72Software / Computing / Free software / Web browsers / Cross-platform software / JavaScript / Web programming / Firefox / Cross-site scripting / Proxy server / Trusted computing base / Browser extension

Improving Web Privacy And Security with a Cost-Benefit Analysis of the Web API by Peter Snyder B.A., Lawrence University, 2006

Add to Reading List

Source URL: www.peteresnyder.com

Language: English - Date: 2018-06-29 22:01:44
73Computing / Android / Computer architecture / System software / Smartphones / Social engineering / IOS / Mach / Google Play / Clickjacking / Yo / Mobile security

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio Chenxiong Qian, Simon P. Chung, Wenke Lee

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:33
74Cryptography / Public-key cryptography / Cryptographic protocols / Key management / Public key infrastructure / DiffieHellman key exchange / Key exchange / Forward secrecy / RSA / Secure channel / XTR / Digital signature

A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:55:11
75Cryptography / NIST hash function competition / Cryptographic hash functions / MerkleDamgrd construction / SIMD / CubeHash / Hash function / SHA-3 / Block cipher

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Charles.Bouillaguet,Gaet

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
76Computing / Internet / Computer network security / Internet privacy / Information and communications technology / Transport Layer Security / Cryptographic protocols / Secure communication / HTTP cookie / HTTPS / Deep packet inspection / Man-in-the-middle attack

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
77Military / Politics of the European Union / Europe / Foreign relations of the European Union / Federica Mogherini / Renzi Cabinet / Coordinated Annual Review on Defence / Common Security and Defence Policy / Permanent Structured Cooperation / High Representative of the Union for Foreign Affairs and Security Policy / European Union / Military Planning and Conduct Capability

Timeline: European cooperation in the area of security and defence We are seeing a historic moment in European defence.

Add to Reading List

Source URL: eeas.europa.eu

Language: English - Date: 2017-12-13 10:23:19
78Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
79Law / Government / Searches and seizures / Digital forensics / Cellebrite / Border search exception / Surveillance / Mobile device forensics / Riley v. California / Internet privacy / United States Department of Homeland Security / Search and seizure

July 10, 2018 The Honorable Rand Paul, Chairman The Honorable Gary C. Peters, Ranking Member U.S. House Committee on Homeland Security Subcommittee on Federal Spending Oversight and Emergency Management H2-176 Ford House

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2018-07-10 16:35:43
80Information theory / Information / Information flow / Mutual information / Conditional entropy / Conditional mutual information / Quicken Interchange Format / Metaphysics / Knowledge

Calculating Quantitative Integrity and Security for Imperative Programs Tom Chothia1 , Chris Novakovic1 , and Rajiv Ranjan Singh2 1 2

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
UPDATE