Computer Security Institute

Results: 1676



#Item
111Theoretical computer science / Logic in computer science / Formal methods / Mathematical logic / KeY / Formal verification / Dynamic logic / Automated theorem proving / Logic / Language-based security

A Theorem Proving Approach to Secure Information Flow in Concurrent Programs (Extended Abstract) Daniel Bruns, Karlsruhe Institute of Technology We present an approach to formally prove secure information flow in multi-t

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2015-07-09 06:40:16
112Software / Computing / Computer access control / Computer security / Hacking / Social engineering / User interface techniques / Security / Cross-site request forgery / Cross-site scripting / Phishing / Clickjacking

A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
113Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
114Cryptography / Computing / Security / Engineering / SimOS / Computer science / Software testing / Institute for Applied Information Processing and Communications / International Conference on Availability /  Reliability and Security / Computer security / Post-quantum cryptography

Scientific Report First name / Family name Dr. Dimitrios Simos

Add to Reading List

Source URL: fellowship.ercim.eu

Language: English - Date: 2015-04-23 10:01:32
115Computer network security / Global Information Assurance Certification / SANS Institute / Computer security / Intrusion detection system

The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-08-20 16:00:38
116

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 2 February 13, 2012

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English
    117

    Targeted Risk Communication for Computer Security Jim Blythe USC Information Sciences Institute

    Add to Reading List

    Source URL: www.isi.edu

    Language: English - Date: 2011-04-21 12:46:13
      118Computer security / Business / Risk analysis / Data security / Computing / Supply chain management / Supply chain risk management / National Institute of Standards and Technology / Security controls / Open Trusted Technology Provider Standard

      ITL Bulletin, Increasing Visibility and Control of Your ICT Supply Chains (June 2015)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-06-15 11:08:27
      119Cryptography / Spamming / Key management / Public-key cryptography / Computer security / Spam filtering / Password / Whitelist / Persona / Key / Email client / Phishing

      The Strengths of Weaker Identities: Opportunistic Personas∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:02
      120Security / Computing / MIT Media Lab / Massachusetts Institute of Technology / Data visualization / Computer security

      Connection Science and Engineering: What problems does network research need to solve? Industry Panel at Workshop on Information and Decision Science The world is moving to distributed, network systems for health, financ

      Add to Reading List

      Source URL: wids.lids.mit.edu

      Language: English - Date: 2012-11-21 08:33:49
      UPDATE