The Security Institute

Results: 5633



#Item
1On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:54:32
2Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India  Abstract— With the decoupling of network control and data

Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 21:01:36
3Country Briefing Note: Security Sector Reform and the Peace Building Process in Cambodia Pou Sothirak Executive Director of the Cambodian Institute for Cooperation and Peace Cambodia

Country Briefing Note: Security Sector Reform and the Peace Building Process in Cambodia Pou Sothirak Executive Director of the Cambodian Institute for Cooperation and Peace Cambodia

Add to Reading List

Source URL: ipf-ssg-sea.net

Language: English - Date: 2017-02-01 04:18:24
    4Network Resiliency and Security Playbook Prepared for The National Institute for Hometown Security November, 2017  Network Resiliency and Security Playbook | November 2017

    Network Resiliency and Security Playbook Prepared for The National Institute for Hometown Security November, 2017 Network Resiliency and Security Playbook | November 2017

    Add to Reading List

    Source URL: www.ctcnet.us

    Language: English - Date: 2018-04-09 16:11:51
      5UNESCO-JASTIP Joint Symposium on Intra-Regional Water Security and Disaster Management Marjorie C. Turiano, Eric C. Cruz Institute of Civil Engineering University of the Philippines Diliman

      UNESCO-JASTIP Joint Symposium on Intra-Regional Water Security and Disaster Management Marjorie C. Turiano, Eric C. Cruz Institute of Civil Engineering University of the Philippines Diliman

      Add to Reading List

      Source URL: jastip.org

      Language: English - Date: 2018-03-01 03:27:30
        6Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N

        Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N

        Add to Reading List

        Source URL: ceres.hh.se

        Language: English - Date: 2015-05-16 14:56:14
          7   The Nautilus Institute for Security and Sustainability  

            The Nautilus Institute for Security and Sustainability  

          Add to Reading List

          Source URL: nautilus.org

          Language: English - Date: 2015-10-28 03:10:13
            8TEGEMEO INSTITUTE OF AGRICULTURAL POLICY AND DEVELOPMENT PROJECT TITLE: TW4/1010 IMPROVING FOOD SECURITY THROUGH THE INTRODUCTION OF NEW SEED VARIETIES

            TEGEMEO INSTITUTE OF AGRICULTURAL POLICY AND DEVELOPMENT PROJECT TITLE: TW4/1010 IMPROVING FOOD SECURITY THROUGH THE INTRODUCTION OF NEW SEED VARIETIES

            Add to Reading List

            Source URL: www.tegemeo.org

            Language: English - Date: 2017-11-16 06:37:41
              9Attack-preserving Security Protocol Transformations Binh Thanh Nguyen, David Basin, and Christoph Sprenger Institute of Information Security, ETH Zurich, Switzerland {thannguy,basin,sprenger}@inf.ethz.ch  Abstract. The r

              Attack-preserving Security Protocol Transformations Binh Thanh Nguyen, David Basin, and Christoph Sprenger Institute of Information Security, ETH Zurich, Switzerland {thannguy,basin,sprenger}@inf.ethz.ch Abstract. The r

              Add to Reading List

              Source URL: people.inf.ethz.ch

              Language: English - Date: 2014-04-16 16:25:39
                10Out of the Dark: UI Redressing and Trustworthy Events Marcus Niemietz, J¨org Schwenk Horst G¨ ortz Institute for IT Security Chair for Network and Data Security

                Out of the Dark: UI Redressing and Trustworthy Events Marcus Niemietz, J¨org Schwenk Horst G¨ ortz Institute for IT Security Chair for Network and Data Security

                Add to Reading List

                Source URL: www.nds.rub.de

                Language: English - Date: 2017-11-03 08:02:27