Security University

Results: 12075



#Item
871

CERIAS Tech ReportA Field Test of Mobile Phone Shielding Devices by Eric Katz Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2011-03-09 16:00:15
    872

    Do Users’ Perceptions of Password Security Match Reality? Blase Ur, Jonathan Bees† , Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University, † The Pennsylvania State Universit

    Add to Reading List

    Source URL: www.ece.cmu.edu

    Language: English - Date: 2016-01-08 22:10:58
      873Systemic risk / Mortgage-backed security / Credit default swap / United States housing bubble / Funds / Structured finance / Derivative / Synthetic CDO / Financial crisis of 200708 / Corporate bond / Algorithmic trading / Futures contract

      Does the Tail Wag the Dog? The Price Impact of CDS Trading∗ Dragon Yongjun Tang† The University of Hong Kong Hong Yan‡ University of South Carolina

      Add to Reading List

      Source URL: www.q-group.org

      Language: English - Date: 2016-03-25 20:51:42
      874

      Reasoning about Concurrency for Security Tunnels Alwyn E. Goodloe University of Pennsylvania Carl A. Gunter University of Illinois at Urbana-Champaign

      Add to Reading List

      Source URL: seclab.illinois.edu

      Language: English - Date: 2011-03-29 17:41:34
        875

        Security, Privacy and Usability Requirements for Federated Identity Michael Hackett and Kirstie Hawkey Faculty of Computer Science Dalhousie University Halifax, Nova Scotia, Canada e-mail: , hawkey@cs.d

        Add to Reading List

        Source URL: w2spconf.com

        Language: English - Date: 2012-05-24 01:30:01
          876

          MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced ­Symbolic Analysis Ruowen Wang, Peng Ning, Tao Xie, and Quan Chen, North Carolina State University This paper is included in the Proceed

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2013-09-28 11:40:36
            877

            JMLR: Workshop and Conference Proceedings vol 40:1–12, 2015 An Almost Optimal PAC Algorithm Hans Ulrich Simon HANS . SIMON @ RUB . DE Horst G¨ortz Institute for IT Security and Faculty of Mathematics, Ruhr-University

            Add to Reading List

            Source URL: jmlr.org

            Language: English - Date: 2015-07-20 20:08:36
              878Prevention / Cryptography / Security / Email / Password / Authentication

              DEAR STUDENTS! The University Computer Center (Hochschulrechen zentrum; HRZ) welcomes your interest in its services; below, you will find information that will help you get started. Your Uni-ID

              Add to Reading List

              Source URL: www.hrz.uni-bonn.de

              Language: English - Date: 2014-03-27 05:13:05
              879

              INSE 6150 Lecture Notes Lecture 11: Human Procedures (cont.) and Hardware Security Course Instructor: Prof. Jeremy Clark Scribed by: Kobra (Ava) Khanmohammadi Concordia University, winter 2014

              Add to Reading List

              Source URL: users.encs.concordia.ca

              Language: English - Date: 2014-04-08 12:02:30
                UPDATE