Computer security conference

Results: 514



#Item
1

Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2011-06-20 08:16:21
    2

    IEEE​ ​Security​ ​Development​ ​Conference​ ​(SecDev)​ ​2018 Call​ ​for​ ​Papers Sponsored​ ​by​ ​the​ ​IEEE​ ​Computer​ ​Society​ ​Technical​ ​Committee on​ ​S

    Add to Reading List

    Source URL: people.cs.vt.edu

    Language: English - Date: 2017-11-28 19:47:13
      3

      Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2011-06-20 08:16:21
        4

        Safely Measuring Tor “Safely Measuring Tor”, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCSRob Jansen

        Add to Reading List

        Source URL: www.robgjansen.com

        - Date: 2018-02-21 17:29:46
          5

          Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

          Add to Reading List

          Source URL: rayb.info

          - Date: 2016-08-19 22:20:15
            6Engineering / Evaluation / Pharmaceutical industry / Validity / Software quality / Quality / Reliability engineering / Survival analysis / Systems engineering / Computer security / Verification and validation / Validation

            International Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification June 28-30, 2016 Espace du Centenaire, Maison de la RATP Paris, France

            Add to Reading List

            Source URL: conferences.ncl.ac.uk

            Language: English - Date: 2016-03-07 04:22:54
            7Computing / Software / Security / Information appliances / Mobile phones / Cloud clients / Microsoft Gadgets / Windows Vista / Internet of things / Computer security / Shred / Smartphone

            2015 Mobile Conference and Barcelona Gadget Show Good News Bad News New Gadgets & Interconnected Devices The biggest event on the tech calendar just took place in Barcelona. This is the next step towards the Internet of

            Add to Reading List

            Source URL: www.documentdestruction.mobi

            Language: English - Date: 2015-03-12 19:10:55
            8Security / Technology / Information Innovation Office / Computer security / Artificial intelligence

            The AAAI-16 Workshop on Artificial Intelligence for Cyber Security (AICS) February 12 or 13, 2016 Phoenix, Arizona, USA Part of the Association for the Advancement of Artificial Intelligence 2016 Conference

            Add to Reading List

            Source URL: www-bcf.usc.edu

            Language: English - Date: 2015-09-12 20:36:52
            9Computing / Evaluation / Relational database management systems / Dependability / Quality / Safety / Security / Database / Association for Computing Machinery / Computer science

            Second Workshop on Dependable Distributed Data Management affiliated with EuroSys 2008 Conference March 31, 2008, Glasgow, Scotland http://gorda.di.uminho.pt/wdddm08/ Program Chairs

            Add to Reading List

            Source URL: gorda.di.uminho.pt

            Language: English - Date: 2013-01-28 10:06:19
            UPDATE