Computer Security Institute

Results: 1676



#Item
11

Cutoff Bounds for Consensus Algorithms Ognjen Marić, Christoph Sprenger, and David Basin Institute of Information Security Department of Computer Science, ETH Zurich Abstract. Consensus algorithms are fundamental build

Add to Reading List

Source URL: people.inf.ethz.ch

Language: English - Date: 2017-09-15 08:25:25
    12

    Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 1 February 4, 2014

    Add to Reading List

    Source URL: courses.csail.mit.edu

    Language: English
      13

      Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 3 February 24, 2012

      Add to Reading List

      Source URL: courses.csail.mit.edu

      Language: English
        14

        Measuring the Security Harm of TLS Crypto Shortcuts Drew Springall† Zakir Durumeric†‡ J. Alex Halderman† † University of Michigan ‡ International Computer Science Institute {aaspring, zakir, jhalderm}@umich.e

        Add to Reading List

        Source URL: jhalderm.com

        - Date: 2017-02-11 13:18:43
          15

          Measuring the Security Harm of TLS Crypto Shortcuts Drew Springall† Zakir Durumeric†‡ J. Alex Halderman† † University of Michigan ‡ International Computer Science Institute {aaspring, zakir, jhalderm}@umich.e

          Add to Reading List

          Source URL: aaspring.com

            16

            Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

            Add to Reading List

            Source URL: www.first.org

            - Date: 2017-08-08 15:42:43
              17

              The Security of a Mix-Center Based on a Semantically Secure Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

              Add to Reading List

              Source URL: www.nada.kth.se

              - Date: 2012-05-30 08:33:53
                18Software / Computing / System software / Computer access control / Password / Security / Cryptography / Pass / Cryptographic software / Challengeresponse authentication / HTTP cookie / Android

                Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

                Add to Reading List

                Source URL: css.csail.mit.edu

                Language: English - Date: 2016-01-29 11:50:05
                19Cryptography / Security / Computer access control / Civil law common law) / Sierre / Authentication / Electronic signature

                An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

                Add to Reading List

                Source URL: www.a-sit.at

                Language: English - Date: 2010-04-14 10:56:00
                20Computing / Network architecture / Transmission Control Protocol / Server / Internet Relay Chat / Network protocols / Computer network security / Internet protocols

                Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYDistributed System Engineering: SpringQuiz I Solutions

                Add to Reading List

                Source URL: nil.csail.mit.edu

                Language: English - Date: 2015-01-05 06:37:34
                UPDATE