Security University

Results: 12075



#Item
31Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 03:19:52
32Agenda-setting theory / Framing / News media / Geography of Europe / Neuroscience / Salience / Cognitive science / Abkhazia

When Does the Public Care? Salience of Security Policy to the Public Caitlin McCulloch University of Maryland, College Park

Add to Reading List

Source URL: www.saramitchell.org

Language: English - Date: 2018-10-19 14:27:17
33Algebra / Mathematics / Polynomials / Computer algebra / Integer factorization algorithms / Finite fields / Special number field sieve / General number field sieve / Irreducible polynomial / Discrete logarithm / Factorization / Resultant

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
34Information / Data management / Computing / Cryptography / Big data / Technology forecasting / Transaction processing / Differential Privacy / Data retention / Internet privacy / Geographic information system / Privacy

Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization Mathias Lecuyer∗1 , Riley Spahn∗1 , Roxana Geambasu1 , Tzu-Kuo Huang†2 , and Siddhartha Sen3 1 Columbia University, 2 Uber Advanced Tec

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:30
35Humancomputer interaction / Reality / Computing / User interface techniques / Augmented reality / Mixed reality / Virtual reality / Multimodal interaction / Microsoft HoloLens / Head-mounted display / Internet privacy / JavaScript

1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:40
36Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-21 15:07:31
37Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
38Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
39Programming language implementation / Software / Computer programming / Compiler construction / Compiler optimizations / Compilers / Register allocation / Instruction set architectures / LLVM / Optimizing compiler / Static single assignment form / GNU Compiler Collection

Instruction Scheduling and Register Allocation on ARM Cortex-M Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:40:08
40

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    UPDATE