11![A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch](https://www.pdfsearch.io/img/fab6638a2c2426873b6d5519a605118b.jpg) | Add to Reading ListSource URL: www.netsec.ethz.chLanguage: English |
---|
12![Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa](https://www.pdfsearch.io/img/8c9fe6b3d23e94dbfa3ec8f9c0ad282f.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-13 08:11:56
|
---|
13![A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman](https://www.pdfsearch.io/img/3d33578d372537266f28b54d96f3aac8.jpg) | Add to Reading ListSource URL: benvds.comLanguage: English - Date: 2018-09-18 11:06:16
|
---|
14![Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology, Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,](https://www.pdfsearch.io/img/6e84f696db07abf1c29989490e32aab5.jpg) | Add to Reading ListSource URL: zkp.scienceLanguage: English - Date: 2018-09-15 05:52:51
|
---|
15![HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer](https://www.pdfsearch.io/img/c8e5c9205a62748b42451c9e44ce73f4.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:27
|
---|
16![High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA](https://www.pdfsearch.io/img/37f8e3f8e3730ba2d241492a9cd7f390.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2011-07-09 00:19:47
|
---|
17![EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security](https://www.pdfsearch.io/img/468352eb55b2c9777d962eff712a6b1c.jpg) | Add to Reading ListSource URL: www.eecs.umich.eduLanguage: English - Date: 2016-11-21 18:50:22
|
---|
18![EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics](https://www.pdfsearch.io/img/8980fb01d1166e337caee2857718eeba.jpg) | Add to Reading ListSource URL: www.eecs.umich.eduLanguage: English - Date: 2016-11-21 18:50:22
|
---|
19![EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security](https://www.pdfsearch.io/img/50407064d717c468fb4e1d6264eb6164.jpg) | Add to Reading ListSource URL: www.eecs.umich.eduLanguage: English - Date: 2016-11-21 18:50:22
|
---|
20![Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that](https://www.pdfsearch.io/img/fd0c7acc93541b567ae9a1927abbe798.jpg) | Add to Reading ListSource URL: s3-ap-southeast-1.amazonaws.comLanguage: English - Date: 2018-10-12 03:26:38
|
---|