Public security

Results: 63438



#Item
971Security Analysis of rSTS Type Multivariate Public Key Cryptosystems against Algebraic Attack Using Gröbner Bases May 28, 2010 Recent Results Session The Third International Workshop on

Security Analysis of rSTS Type Multivariate Public Key Cryptosystems against Algebraic Attack Using Gröbner Bases May 28, 2010 Recent Results Session The Third International Workshop on

Add to Reading List

Source URL: pqc2010.cased.de

Language: English - Date: 2010-06-10 08:19:24
    972MEDIA RELEASE 29 July 2015 ACSC RELEASES FIRST EVER PUBLIC NATIONAL CYBER THREAT REPORT The Australian Cyber Security Centre (ACSC) today released its first ever unclassified cyber security threat report.

    MEDIA RELEASE 29 July 2015 ACSC RELEASES FIRST EVER PUBLIC NATIONAL CYBER THREAT REPORT The Australian Cyber Security Centre (ACSC) today released its first ever unclassified cyber security threat report.

    Add to Reading List

    Source URL: www.acsc.gov.au

    Language: English - Date: 2015-07-28 02:00:30
      973A Tangled Mass: The Android Root Certificate Stores Narseo Vallina-Rodriguez Johanna Amann  Christian Kreibich

      A Tangled Mass: The Android Root Certificate Stores Narseo Vallina-Rodriguez Johanna Amann Christian Kreibich

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2014-12-01 16:56:17
      974Notice of Confidentiality Rights: If you are a natural person, you may remove or strike any of the following information from this instrument before it is filed for record in the public records: your Social Security Numb

      Notice of Confidentiality Rights: If you are a natural person, you may remove or strike any of the following information from this instrument before it is filed for record in the public records: your Social Security Numb

      Add to Reading List

      Source URL: joshblackman.com

      Language: English - Date: 2012-08-27 02:41:26
        975Campus Security Authorities (CSA) at University at Buffalo (PDF)

        Campus Security Authorities (CSA) at University at Buffalo (PDF)

        Add to Reading List

        Source URL: www.public-safety.buffalo.edu

        Language: English - Date: 2013-01-03 14:42:41
          976ISSE 2015: The 2nd International Workshop on the Integration of Safety and Security Engineering Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

          ISSE 2015: The 2nd International Workshop on the Integration of Safety and Security Engineering Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

          Add to Reading List

          Source URL: safecomp2015.tudelft.nl

          Language: English - Date: 2015-09-14 10:24:23
          977Certicom AMI 7000 Series  Security Appliances for Advanced Metering Infrastructure The Need for Security

          Certicom AMI 7000 Series Security Appliances for Advanced Metering Infrastructure The Need for Security

          Add to Reading List

          Source URL: www.certicom.com

          Language: English - Date: 2010-08-10 15:49:45
          978Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

          Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

          Add to Reading List

          Source URL: fc15.ifca.ai

          Language: English - Date: 2015-01-11 00:32:58
          979Efficient Circuit-Size Independent Public Key Encryption with KDM Security Tal Malkin1 , Isamu Teranishi1,2 , and Moti Yung1,3 1  Columbia University

          Efficient Circuit-Size Independent Public Key Encryption with KDM Security Tal Malkin1 , Isamu Teranishi1,2 , and Moti Yung1,3 1 Columbia University

          Add to Reading List

          Source URL: www.cs.columbia.edu

          Language: English - Date: 2011-02-08 15:43:32
            9801  On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

            1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

            Add to Reading List

            Source URL: www.qatar.cmu.edu

            Language: English - Date: 2004-12-05 23:21:27