IO

Results: 17950



#Item
251

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
    252Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

    Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

    Add to Reading List

    Source URL: hacken.io

    Language: English - Date: 2017-10-12 11:58:38
    253

    www.cot.io COT 白皮书

    Add to Reading List

    Source URL: cot.io

    Language: Chinese - Date: 2018-10-21 01:18:45
      254

      S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

      Add to Reading List

      Source URL: acmccs.github.io

      Language: English - Date: 2017-12-30 21:51:59
        255Central Intelligence Agency / Cold War in popular culture / McLean /  Virginia / Change impact analysis / Program slicing / Mining software repositories / Reverse engineering / Software engineering / Computing / Change

        SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. ReliabPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: stvr.1475 A survey of code-based change impact analysis te

        Add to Reading List

        Source URL: zhang-sai.github.io

        Language: English - Date: 2015-05-05 00:58:34
        256

        Nishant Shukla Notes July 12, 2017

        Add to Reading List

        Source URL: shukla.io

        Language: English - Date: 2017-10-15 18:03:50
          257Computing / Webmail / Cybercrime / Software / Fraud / Spamming / Gmail / Phishing / The Spamhaus Project / Identity theft / Yahoo! Mail / Botnet

          What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhi

          Add to Reading List

          Source URL: jonaolapo.github.io

          Language: English - Date: 2018-10-25 12:11:25
          258Behavior modification / Behaviorism / Token economy / Token coin / Cryptocurrencies / Economy / Psychology / Money / Computer access control

          The attached white paper is meant to describe the currently anticipated plans of Messari Inc. (“​Messari​”) for developing a new blockchain token mechanism (“​Token​”) that will be used on the network spo

          Add to Reading List

          Source URL: messari.github.io

          Language: English - Date: 2018-10-11 11:52:47
          259Computing / Formal languages / Computer programming / Mathematics / String / Substring / Regular expression / Rope / Expr / Hash function / Recursion / Longest common substring problem

          BlinkFill: Semi-supervised Programming By Example for Syntactic String Transformations Rishabh Singh Microsoft Research, Redmond, USA

          Add to Reading List

          Source URL: rishabhmit.bitbucket.io

          Language: English - Date: 2018-06-25 09:59:57
          260Shard / Trilemma / Information / Human behavior

          Version 1.0 Smart contractNick Szabo

          Add to Reading List

          Source URL: www.ultrain.io

          Language: English - Date: 2018-10-16 03:31:30
          UPDATE