Computer security

Results: 47159



#Item
81A Novel Approach for Computer Security Education Using Minix Instructional Operating System ∗ Wenliang Du†, Mingdong Shang, and Haizhi Xu Department of Electrical Engineering and Computer Science, 3-114 Center for Sc

A Novel Approach for Computer Security Education Using Minix Instructional Operating System ∗ Wenliang Du†, Mingdong Shang, and Haizhi Xu Department of Electrical Engineering and Computer Science, 3-114 Center for Sc

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2005-04-21 18:24:41
    82Potentia est Scientia: Security and Privacy Implications of Energy-Proportional Computing Shane S. Clark, Benjamin Ransford, Kevin Fu Dept. of Computer Science, Univ. of Massachusetts, Amherst {ssclark,ransford,kevinfu}@

    Potentia est Scientia: Security and Privacy Implications of Energy-Proportional Computing Shane S. Clark, Benjamin Ransford, Kevin Fu Dept. of Computer Science, Univ. of Massachusetts, Amherst {ssclark,ransford,kevinfu}@

    Add to Reading List

    Source URL: sharps.org

    Language: English - Date: 2013-02-04 13:02:13
      83A New Model of Security for Metasystems ? Steve J. Chapin, Chenxi Wang, William A. Wulf, Fritz Knabe, and Andrew Grimshaw Department of Computer Science, University of Virginia, Charlottesville, VA 22903{2442, fchapin,cw

      A New Model of Security for Metasystems ? Steve J. Chapin, Chenxi Wang, William A. Wulf, Fritz Knabe, and Andrew Grimshaw Department of Computer Science, University of Virginia, Charlottesville, VA 22903{2442, fchapin,cw

      Add to Reading List

      Source URL: www.cs.virginia.edu

      Language: English - Date: 1999-09-01 15:39:58
        84A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        Add to Reading List

        Source URL: faculty.nps.edu

        Language: English - Date: 2008-05-06 17:12:31
          85CS255: Cryptography and Computer Security  Winter 2010 Final Exam Instructions

          CS255: Cryptography and Computer Security Winter 2010 Final Exam Instructions

          Add to Reading List

          Source URL: crypto.stanford.edu

          Language: English - Date: 2010-03-21 15:11:32
            86Programming Satan’s Agents Volker Roth Fraunhofer Institute for Computer Graphics Dept. Security Technology RundeturmstrasseDarmstadt

            Programming Satan’s Agents Volker Roth Fraunhofer Institute for Computer Graphics Dept. Security Technology RundeturmstrasseDarmstadt

            Add to Reading List

            Source URL: www.volkerroth.com

            Language: English - Date: 2007-11-23 00:00:08
              87CS461/ECE422 Computer Security I April 15, 2015 Project 5: Forensics

              CS461/ECE422 Computer Security I April 15, 2015 Project 5: Forensics

              Add to Reading List

              Source URL: courses.engr.illinois.edu

              Language: English - Date: 2015-04-20 13:04:03
                88HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

                HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

                Add to Reading List

                Source URL: www.ieee-security.org

                Language: English - Date: 2017-04-03 15:58:27
                  89Published in F. Kerschbaum and S. Paraboschi, Eds., Data and Applications Security and Privacy XXXII (DBSec 2018), volof Lecture Notes in Computer Science, pp. 243–259, Springer, 2018. Private yet Efficient Dec

                  Published in F. Kerschbaum and S. Paraboschi, Eds., Data and Applications Security and Privacy XXXII (DBSec 2018), volof Lecture Notes in Computer Science, pp. 243–259, Springer, 2018. Private yet Efficient Dec

                  Add to Reading List

                  Source URL: joye.site88.net

                  Language: English - Date: 2018-07-11 18:14:38
                    90Ethics  Building an Active Computer Security Ethics Community  In spite of significant ethical challenges faced by

                    Ethics Building an Active Computer Security Ethics Community In spite of significant ethical challenges faced by

                    Add to Reading List

                    Source URL: jjcweb.jjay.cuny.edu

                    Language: English - Date: 2017-03-25 12:07:19