Security paper

Results: 6621



#Item
1Computer network security / Computing / Multi-agent systems / Cyberwarfare / Botnets / Spamming / Cybercrime / Serverless computing / Bot herder / Computer security / Internet bot

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 13:30:48
2Computing / Free software / Internet privacy / File sharing / Peer-to-peer computing / Distributed data storage / Internet protocols / Dark web / ZeroNet / Peer-to-peer / I2P / Distributed hash table

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 16:10:18
3Computing / Information and communications technology / Technology / Networking hardware / Wireless networking / Computer network security / Server appliance / Internet of things / Router / Mirai / Computer network / Computer security

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 21:00:14
4Computational neuroscience / Chemistry / Applied mathematics / Artificial neural networks / Phase transitions / Statistics / Scientific modeling / Design of experiments / Deep learning / Distillation / Outlier / Surrogate model

A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 02:41:14
5Software / Computing / Web browsers / Computer network security / Mozilla / Social engineering / Portable software / Phishing / Firefox / Microsoft SmartScreen / Mozilla Corporation / Google Chrome

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe, University of California, Berkeley; Adrienne Porter Felt, Google, Inc. This paper is included in the Proceedings

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2013-09-28 11:40:42
6Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Malleability / Message authentication code / Paillier cryptosystem / RSA / Digital signature

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
7Domain name system / Internet / Cryptography / Computing / Domain Name System Security Extensions / Sender Policy Framework / DNS-based Authentication of Named Entities / DMARC / Name server / Extension mechanisms for DNS / DNS root zone / Email authentication

Short Paper: On Deployment of DNS-based Security Enhancements Pawel Szalachowski and Adrian Perrig ETH Zurich, Switzerland Abstract. Although the Domain Name System (DNS) was designed as a naming

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
8

WHITE PAPER Go Nuclear: Breaking Radiation Monitoring Devices Ruben Santamarta Principal Security Consultant, IOActive

Add to Reading List

Source URL: ioactive.com

Language: English - Date: 2018-08-17 20:57:50
    9

    A Look Back at “Security Problems in the TCP/IP Protocol Suite” Steven M. Bellovin AT&T Labs—Research Abstract About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol s

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:49:51
      10

      Unlocking Wealth from the Blockchain for Everyone 5M White Paper Token Security Scheme (TSS) incorporating Distributed Hardware Security Modules (DHSMs) for

      Add to Reading List

      Source URL: www.tsstoken.com

      Language: English - Date: 2017-10-16 11:52:14
        UPDATE