Security University

Results: 12075



#Item
12015 IEEE Symposium on Security and Privacy  Effective Real-time Android Application Auditing Mingyuan Xia McGill University

2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University

Add to Reading List

Source URL: mxia.me

Language: English - Date: 2017-02-08 07:01:32
2Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:45
    3DR. KRISTA E. WIEGAND Director, Global Security Program Howard H. Baker Jr. Center for Public Policy University of Tennessee, Knoxville 1640 Cumberland Ave. Knoxville, TN

    DR. KRISTA E. WIEGAND Director, Global Security Program Howard H. Baker Jr. Center for Public Policy University of Tennessee, Knoxville 1640 Cumberland Ave. Knoxville, TN

    Add to Reading List

    Source URL: www.kristawiegand.com

    Language: English - Date: 2018-09-10 12:37:41
    4HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

    HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 23:38:22
    5Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

    Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:44
    6Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands

    Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-02-09 07:40:06
    7SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

    SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2006-03-21 11:51:07
    8Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

    Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:11:56
    9Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

    Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2009-09-22 19:00:54
    10Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* *  Beijing University of Posts and Telecommunications, Beijing, China

    Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 12:53:26