Security University

Results: 12075



#Item
21Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:54:32
22Artificial intelligence / World Wide Web / Human-based computation / Technology / Computer vision / Computer access control / Anti-spam / CAPTCHA / Computer security / Internet bot / Turing test / Transaction authentication number

Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 09:05:50
23Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
24Software / Computing / Web browsers / Computer network security / Mozilla / Social engineering / Portable software / Phishing / Firefox / Microsoft SmartScreen / Mozilla Corporation / Google Chrome

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe, University of California, Berkeley; Adrienne Porter Felt, Google, Inc. This paper is included in the Proceedings

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2013-09-28 11:40:42
25Computing / Computer architecture / System software / Recall / Android / Pattern / Short-term memory / Student's t-test

SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:19
26Software / Computing / Free software / Web browsers / Cross-platform software / JavaScript / Web programming / Firefox / Cross-site scripting / Proxy server / Trusted computing base / Browser extension

Improving Web Privacy And Security with a Cost-Benefit Analysis of the Web API by Peter Snyder B.A., Lawrence University, 2006

Add to Reading List

Source URL: www.peteresnyder.com

Language: English - Date: 2018-06-29 22:01:44
27Cryptography / Public-key cryptography / Cryptographic protocols / Key management / Public key infrastructure / DiffieHellman key exchange / Key exchange / Forward secrecy / RSA / Secure channel / XTR / Digital signature

A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:55:11
28Computing / Internet / Computer network security / Internet privacy / Information and communications technology / Transport Layer Security / Cryptographic protocols / Secure communication / HTTP cookie / HTTPS / Deep packet inspection / Man-in-the-middle attack

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
29Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
30Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 10:57:28
UPDATE