1![Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con](https://www.pdfsearch.io/img/44d88fb638c8dac286b2fa7a1f8e652d.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-15 11:54:40
|
---|
2![Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl](https://www.pdfsearch.io/img/0ce71d16bf24088654323a9a9cc6fffe.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-15 19:28:54
|
---|
3![Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†* Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*](https://www.pdfsearch.io/img/f03c78c17a550f3e250809701dae29b6.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:59
|
---|
4![2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University 2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University](https://www.pdfsearch.io/img/f4717def5487312c26e2a59c8be640f1.jpg) | Add to Reading ListSource URL: mxia.meLanguage: English - Date: 2017-02-08 07:01:32
|
---|
5![Finding and Preventing Bugs in JavaScript Bindings Fraser Brown⋆ Dawson Engler⋆ ⋆ Shravan Narayan† Finding and Preventing Bugs in JavaScript Bindings Fraser Brown⋆ Dawson Engler⋆ ⋆ Shravan Narayan†](https://www.pdfsearch.io/img/3893f436a433d59abaa7a137ff8da218.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:08
|
---|
6![DEPARTMENT OF HOMELAND SECURITY AWARDS OCTO CONSULTING GROUP $300M CEILING SERVICES ENABLING AGILE DELIVERY (SEAD) BPA CONTRACT Octo will deliver Agile and DevOps practices through embedded experts to expedite the agency DEPARTMENT OF HOMELAND SECURITY AWARDS OCTO CONSULTING GROUP $300M CEILING SERVICES ENABLING AGILE DELIVERY (SEAD) BPA CONTRACT Octo will deliver Agile and DevOps practices through embedded experts to expedite the agency](https://www.pdfsearch.io/img/a5477b83441df8c35a3394c97704c9a0.jpg) | Add to Reading ListSource URL: www.octoconsulting.comLanguage: English - Date: 2018-08-27 12:37:57
|
---|
7![Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p](https://www.pdfsearch.io/img/bffa50c3cabd137ab83ea2812143f40e.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:45
|
---|
8![EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords](https://www.pdfsearch.io/img/b95fce0da14fd992715dc9300206407f.jpg) | Add to Reading ListSource URL: www.eecs.umich.eduLanguage: English - Date: 2016-11-21 18:50:20
|
---|
9![How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy Hao Yang1 , Xiulin Ma1 , Kun Du1 , Zhou Li2 , Haixin Duan1* , Xiaodong Su3 , Guang Liu3 , Zhifeng Gen How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy Hao Yang1 , Xiulin Ma1 , Kun Du1 , Zhou Li2 , Haixin Duan1* , Xiaodong Su3 , Guang Liu3 , Zhifeng Gen](https://www.pdfsearch.io/img/525a9a6e928ff494934c021d13c403a9.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:24
|
---|
10![BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs WHITEPAPER Q4 2018 AUTHORS D. ACHOUR, L. ALDOORY, H. KHOURY, BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs WHITEPAPER Q4 2018 AUTHORS D. ACHOUR, L. ALDOORY, H. KHOURY,](https://www.pdfsearch.io/img/33f2814b3f4830761f39b9c5760e73e0.jpg) | Add to Reading ListSource URL: www.kambio.ioLanguage: English - Date: 2018-10-18 01:47:10
|
---|