Security University

Results: 12075



#Item
61

Achieving Security Despite Compromise Using Zero-knowledge Michael Backes1,2 , Martin P. Grochulla1 , C˘at˘alin Hrit¸cu1 , and Matteo Maffei1 1 Saarland University, Saarbr¨ucken, Germany 2

Add to Reading List

Source URL: www.sps.cs.uni-saarland.de

Language: English - Date: 2013-10-09 19:06:00
    62

    STACKABLE CREDENTIALS IN CYBER SECURITY Presented by Dr. Rob Robertson (Southern Utah University) Matt Heffelfinger (Las Vegas Sands Corp.)

    Add to Reading List

    Source URL: www.fbcinc.com

    Language: English - Date: 2017-11-15 14:36:44
      63

      Verifiable Policy-Defined Networking for Security Management Dinesha Ranathunga* , Matthew Roughan* , Phil Kernick** , Nick Falkner* , Hung Nguyen* , Michelle McClintock* , Marian Mihailescu* * University of Adelaide

      Add to Reading List

      Source URL: www.maths.adelaide.edu.au

      Language: English - Date: 2017-04-06 22:23:22
        64

        Teaching Computer Security Teaching Computer Security Matt Bishop Department of Computer Science University of California at Davis

        Add to Reading List

        Source URL: seclab.cs.ucdavis.edu

        Language: English - Date: 2006-01-16 10:12:36
          65

          Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

          Add to Reading List

          Source URL: www.cs.bham.ac.uk.

          Language: English - Date: 2011-06-20 08:16:21
            66

            Recruitment PhD Students/Interns & Postdocs on Cyber Security at SUTD, Singapore Singapore University of Technology and Design (SUTD) is a young university which was established in collaboration with MIT. iTrust is a Cyb

            Add to Reading List

            Source URL: jianying.space

            Language: English - Date: 2017-12-11 07:55:51
              67

              Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract

              Add to Reading List

              Source URL: www.nds.rub.de

              Language: English - Date: 2017-07-13 05:46:45
                68

                Midlet Navigation Graphs in JML Wojciech Mostowski and Erik Poll Radboud University Nijmegen Digital Security Group ,

                Add to Reading List

                Source URL: ceres.hh.se

                Language: English - Date: 2015-05-16 14:55:47
                  69

                  A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2018-01-18 13:44:36
                    70

                    Where is the Digital Divide? A Survey of Security, Privacy, and Socioeconomics Elissa M. Redmiles University of Maryland

                    Add to Reading List

                    Source URL: www.cs.umd.edu

                    Language: English - Date: 2017-02-12 11:39:27
                      UPDATE