Computer security conference

Results: 514



#Item
51

R&:MAr~I<8, FOR SRD AEROSPACE COMPUTER SECURITY CONFERENCE DECEMBER 9, 1987

Add to Reading List

Source URL: acsac.org

Language: English
    52

    Published in ACSAC’09: Proceedings of the 25th Annual Computer Security Applications Conference, Honolulu, Hawaii, DecemberAnalyzing Information Flow in JavaScript-based Browser Extensions Mohan Dhawan and Vinod

    Add to Reading List

    Source URL: paul.rutgers.edu

    Language: English - Date: 2010-09-26 13:44:04
      53

      CALL FOR PAPERS 20th ACM Conference on Computer and Communications Security (CCSNovember 4-8 in Berlin, Germany http://www.sigsac.org/ccs/CCS2013 The ACM Conference on Computer and Communications Security (CCS) is

      Add to Reading List

      Source URL: www.sigsac.org

      Language: English - Date: 2013-12-17 07:12:00
        54Security / Academia / Tamer Baar / Computer security / Game theory / Privacy / Ambient intelligence / Resilient control systems

        2014 Conference on Decision and Game Theory for Security (GameSec), Los Angeles, CA, USA General Chair: Radha Poovendran, Univ. of Washington, WA, USA TPC Chair:

        Add to Reading List

        Source URL: www.gamesec-conf.org

        Language: English - Date: 2014-06-15 20:18:22
        55Crime prevention / Cryptography / National security / Automotive industry / European Network Exchange / Isse punctata / Isse / European Data Protection Supervisor / European Union Agency for Network and Information Security / Giovanni Buttarelli / Computer security / Cryptomathic

        ISSE/2015/Press releases/Programme FINAL 15th July 2015 Europe’s Leading Independent Interdisciplinary Security Conference Unveils 2015 Programme ISSE 2015 takes place 10th and 11th November 2015, Hotel Palace Berlin,

        Add to Reading List

        Source URL: www.isse.eu.com

        Language: English - Date: 2015-07-28 07:23:48
        56

        Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

        Add to Reading List

        Source URL: www.cs.bham.ac.uk

        Language: English - Date: 2011-06-20 08:16:21
          57

          Published in CCS’08: Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, OctoberEnforcing Authorization Policies using Transactional Memory Introspection Arnar B

          Add to Reading List

          Source URL: paul.rutgers.edu

          Language: English - Date: 2010-09-26 13:44:04
            58Cryptography / Computing / Security / Engineering / SimOS / Computer science / Software testing / Institute for Applied Information Processing and Communications / International Conference on Availability /  Reliability and Security / Computer security / Post-quantum cryptography

            Scientific Report First name / Family name Dr. Dimitrios Simos

            Add to Reading List

            Source URL: fellowship.ercim.eu

            Language: English - Date: 2015-04-23 10:01:32
            59Safety / Formal methods / Control engineering / Computer systems / Software quality / Session / Computer security / Embedded system / Life-critical system / Safety case / Systems engineering / Automobile safety

            SAFECOMP 2015 Conference Programme September 23-25, 2015 TU Delft Congress Centre MekelwegCC Delft

            Add to Reading List

            Source URL: safecomp2015.tudelft.nl

            Language: English - Date: 2015-09-15 06:05:36
            60

            2008 Annual Computer Security Applications Conference Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection∗ Peng Li University of North Carolina at Chapel Hill

            Add to Reading List

            Source URL: flyer.sis.smu.edu.sg

            Language: English - Date: 2014-12-17 01:40:50
              UPDATE