Security

Results: 374843



#Item
51Taxation in the United States / Tax / Tax forms / Cisco Systems / Deep packet inspection / Videotelephony / Value-added tax / IRS tax forms / Internal Revenue Service

CASE STUDY Increased security and availability for the Slovak Tax Directorate´s portal

Add to Reading List

Source URL: www.soitron.com

Language: English - Date: 2018-01-15 09:55:34
52Computing / Network architecture / Internet architecture / Internet / Routing / Internet Standards / Internet protocols / Forwarding plane / Router / Border Gateway Protocol / Open Shortest Path First / Multiprotocol Label Switching

The SCION Internet Architecture An Internet Architecture for the 21st Century David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski Network Security Group, ETH Zurich, Switzerland March 6,

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
53Algebra / Linear algebra / Mathematics / Numerical linear algebra / Matrices / Matrix theory / Multiplication / Gaussian elimination / Matrix multiplication / Pivot element / Invertible matrix / Matrix

SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:51:07
54Cryptography / Cyberwarfare / Computer security / Key management / Public key infrastructure / Software bugs / Computer network security / E-commerce / Buffer overflow / HTTP cookie / Cross-site scripting / Certificate authority

EECS 388 Intro to Computer Security November 11, 2016 Homework 5: Exam Review

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
55Domain name system / Internet / Internet Standards / Network architecture / Computing / Domain Name System Security Extensions / Name server / Domain name / Root name server / WHOIS / Fully qualified domain name / Second-level domain

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
56

Sentinel Protocol Security Intelligence Platform for Blockchain 초록 21세기 컴퓨터 기술의 급속한 발전은 그 역설적으로 혁신을 저해하는 정교하고 지

Add to Reading List

Source URL: s3-ap-southeast-1.amazonaws.com

Language: Korean - Date: 2018-10-12 03:26:38
    57Software / Computing / Antivirus software / Security breaches / Proprietary software / Malware / Kaspersky Lab / Google Chrome / Internet Explorer

    Poster: Detecting WebInjects through Live Memory Inspection Nicola Mariani∗ , Andrea Continella∗ , Marcello Pogliani∗ , Michele Carminati∗ , Federico Maggi∗† , and Stefano Zanero∗ ∗ Dipartimento

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-02 20:58:16
    58Cybercrime / Computer security / Cyberwarfare / Security engineering / Computer network security / Cyberspace / National security / Denial-of-service attack / Cyberattack / Network security

    CALL FOR PAPERS Special Issue of the International Journal on Network Management (IJNM) on Measure, Detect and Mitigate – Challenges and Trends in Network Security Publication: September 2015

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2014-09-02 00:52:00
    59Stock market / Finance / Initial public offering / 73rd United States Congress / U.S. Securities and Exchange Commission / Prospectus / Securities Act / Initial coin offering / Security / Money / Economy

    BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs Q4 2018 Disclaimer

    Add to Reading List

    Source URL: www.kambio.io

    Language: English - Date: 2018-10-18 01:47:00
    60Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

    Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:11:56
    UPDATE