Security Analysis

Results: 6956



#Item
51DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2018-04-09 14:09:44
    52Anett Hoppe WorldCIS 2016 Security vs. Privacy? Analysis of Privacy Policies of IT Security Software

    Anett Hoppe WorldCIS 2016 Security vs. Privacy? Analysis of Privacy Policies of IT Security Software

    Add to Reading List

    Source URL: www.av-test.org

    Language: English - Date: 2018-06-19 04:47:13
      53Security Analysis of rSTS Type Multivariate Public Key Cryptosystems against Algebraic Attack Using Gröbner Bases May 28, 2010 Recent Results Session The Third International Workshop on

      Security Analysis of rSTS Type Multivariate Public Key Cryptosystems against Algebraic Attack Using Gröbner Bases May 28, 2010 Recent Results Session The Third International Workshop on

      Add to Reading List

      Source URL: pqc2010.cased.de

      Language: English - Date: 2010-06-10 08:19:24
        54A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

        A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

        Add to Reading List

        Source URL: valena-svcoin.io

        Language: English - Date: 2018-04-01 09:51:23
          55Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

          Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

          Add to Reading List

          Source URL: fc05.ifca.ai

          Language: English - Date: 2005-01-13 13:56:52
            56Exercise 1 Datalog and Network Reliability Program Analysis for System Security and Reliability 2018 ETH Zurich February 27, 2018

            Exercise 1 Datalog and Network Reliability Program Analysis for System Security and Reliability 2018 ETH Zurich February 27, 2018

            Add to Reading List

            Source URL: www.sri.inf.ethz.ch

            Language: English - Date: 2018-05-15 09:28:46
              57Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

              Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

              Add to Reading List

              Source URL: software.imdea.org

              Language: English - Date: 2010-09-02 11:11:48
                58A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

                A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

                Add to Reading List

                Source URL: faculty.nps.edu

                Language: English - Date: 2008-05-06 17:12:31
                  59Freedom 2.1 Security Issues and Analysis Adam Back, Ian Goldberg, Adam Shostack Zero-Knowledge Systems, Inc. adamb,ian,adam @zeroknowledge.com 

                  Freedom 2.1 Security Issues and Analysis Adam Back, Ian Goldberg, Adam Shostack Zero-Knowledge Systems, Inc. adamb,ian,adam @zeroknowledge.com 

                  Add to Reading List

                  Source URL: www.cypherspace.org

                  Language: English - Date: 2003-11-23 22:37:31