Security

Results: 374843



#Item
71Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 12:53:26
72

Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities Mustafa Al-Bassam1 , Alberto Sonnino1 , and Vitalik Buterin2 1

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

- Date: 2018-09-24 13:50:14
    73

    Safety Envelope for Security∗ Ashish Tiwari Bruno Dutertre SRI International Pat Lincoln

    Add to Reading List

    Source URL: csl.sri.com

    Language: English - Date: 2014-06-27 13:33:30
      74

      AHEAD Enterprise Cloud Delivery Framework Cloud Management DevOps Security

      Add to Reading List

      Source URL: www.thinkahead.com

      - Date: 2018-08-17 14:07:16
        75Cryptography / Public-key cryptography / Cryptographic protocols / Identity-based cryptography / ID-based encryption / Functional encryption / Garbled circuit / Encryption / Secure multi-party computation / Attribute-based encryption / RSA / Chosen-ciphertext attack

        Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2017-10-01 05:36:24
        76Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

        Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

        Add to Reading List

        Source URL: zkp.science

        Language: English - Date: 2018-09-15 05:52:51
        77

        MASTER UNIVERSITARIO DI II LIVELLO HOMELAND SECURITY SISTEMI, METODI E STRUMENTI PER LA SECURITY E IL CRISIS MANAGEMENT

        Add to Reading List

        Source URL: www.asisitaly.org

        Language: Italian - Date: 2017-12-14 10:11:38
          78

          1 SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel∗ and Yupeng Zhang† Research, † University of Maryland

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2017-04-03 16:01:37
            79Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

            HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

            Add to Reading List

            Source URL: www.ieee-security.org

            Language: English - Date: 2017-04-03 15:58:27
            80Computer security / Computing / Cyberwarfare / Computer network security / Hacking / Web applications / OWASP / Web application security / Security / Application security / XML external entity attack / SQL injection

            OWASP TopThe Ten Most Critical Web Application Security Risks https://owasp.org This work is licensed under a

            Add to Reading List

            Source URL: www.doc.ic.ac.uk

            Language: English - Date: 2018-03-08 11:23:41
            UPDATE