Computer Security Institute

Results: 1676



#Item
1Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
2System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
3

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English
    4

    Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

    Add to Reading List

    Source URL: www.volkerroth.com

    Language: English - Date: 2007-11-23 00:00:49
      5

      Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 3 February 23, 2015

      Add to Reading List

      Source URL: courses.csail.mit.edu

      Language: English
        6

        A Characterization of IPv6 Network Security Policy Mark Allman International Computer Science Institute MAPRG Meeting April 2016

        Add to Reading List

        Source URL: www.icir.org

        Language: English - Date: 2016-04-04 11:55:18
          7

          2010 IEEE Symposium on Security and Privacy Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and

          Add to Reading List

          Source URL: oaklandsok.github.io

          Language: English - Date: 2018-03-14 15:33:55
            8

            Programming Satan’s Agents Volker Roth Fraunhofer Institute for Computer Graphics Dept. Security Technology RundeturmstrasseDarmstadt

            Add to Reading List

            Source URL: www.volkerroth.com

            Language: English - Date: 2007-11-23 00:00:08
              UPDATE