Information security

Results: 50180



#Item
1Identification / Computing / Cryptography / Security engineering / Touchscreens / Multi-touch / Biometrics / Gesture / Authentication / Support vector machine / Shoulder surfing / Tablet computer

Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:59
2Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
3Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Add to Reading List

Source URL: cohney.info

Language: English - Date: 2018-09-29 19:30:48
4

INFORMATION Dear Customer, Please be informed that in view for increasing the safety of card use abroad, as of 19 January 2016 the Bank enters new security requirements in force. If you travel to a country outside of Eu

Add to Reading List

Source URL: www.raiffeisen.hu

    5Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

    Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:13:56
    6Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

    Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-24 15:44:20
    7Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

    Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 09:17:38
    8Law / Terms of service / Privacy law / Government / Information privacy / Privacy / Human rights / Medical privacy / Internet privacy / Office of the Australian Information Commissioner / Personally identifiable information / Personal Information Protection and Electronic Documents Act

    NPPA PRIVACY POLICY NPP Australia Limited (NPPA) is committed to protecting and maintaining the privacy, accuracy and security of an individual’s personal information. This Privacy Policy describes how NPPA manages the

    Add to Reading List

    Source URL: www.nppa.com.au

    Language: English - Date: 2018-02-26 22:05:21
    9Terms of service / Software / Computing / Technology / Social networking services / Microblogging / Real-time web / Text messaging / Twitter / Privacy / Internet privacy / Medical privacy

    Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-11 01:15:34
    10Computing / Prevention / Security engineering / Computer security / Data security / Crime prevention / Cryptography / National security / Information technology audit / Audit / Internal control / Database security

    State Corporation Commission - Audit of Information Security and Travel and Small Purchase Charge Card Expenses for the year ended June 30, 2017

    Add to Reading List

    Source URL: www.apa.virginia.gov

    Language: English - Date: 2018-10-25 10:47:54
    UPDATE