Computer

Results: 301026



#Item
81Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
82Wireless networking / Computing / Information and communications technology / Computer networking / Technology / Network protocols / Data transmission / Internet of things / Vehicular ad hoc network / Wireless ad hoc network / Mobile ad hoc network / Network packet

Data Preference Matters: A New Perspective of Safety Data Dissemination in Vehicular Ad Hoc Networks Qiao Xiang1 , Xi Chen1, Linghe Kong1 , Lei Rao2 , Xue Liu1 1 School of Computer Science, McGill University, Canada, 2

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:56
83Mathematics / Combinatorics / Combinatorial optimization / Greedoid / Order theory / Matroid theory / Matroid / Universal property / Greedy algorithm

A Class of Greedy Algorithms And Its Relation to Greedoids Srinivas Nedunuri Dept. of Computer S ien es University of Texas at Austin

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2014-10-03 20:56:47
84Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-01-15 12:55:59
85

die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Pragmatismus in Thailand: GSM-Basisstation mit Palmenantenne. Photo aufgenommen von David Bank auf Koh Phi-Phi / Th

Add to Reading List

Source URL: ds.ccc.de

Language: German - Date: 2006-07-04 19:23:06
    86Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

    Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

    Add to Reading List

    Source URL: zkp.science

    Language: English - Date: 2018-09-15 05:52:51
    87Algebra / Mathematics / Representation theory of Lie groups / Lie algebras / Matrix theory / Spectral theory / Lattice / Weight / Jordan normal form / Spectral theory of ordinary differential equations

    A New View on HJLS and PSLQ: Sums and Projections of Lattices Jingwei Chen†,‡ Chengdu Institute of Computer Application, CAS

    Add to Reading List

    Source URL: perso.ens-lyon.fr

    Language: English - Date: 2017-06-27 04:39:36
    88Finite automata / Temporal logic / Automated planning and scheduling / Linear temporal logic / Theoretical computer science / Neuropsychology / Computational complexity theory / Model checking / Deterministic finite automaton / Finite-state machine / Nondeterministic finite automaton / Algorithm

    Planning Under Uncertainty with Temporally Extended Goals Alberto Camacho ∗ Department of Computer Science University of Toronto. Canada.

    Add to Reading List

    Source URL: icaps16.icaps-conference.org

    Language: English - Date: 2016-06-16 07:11:20
    89Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

    HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:27
    UPDATE