Vector Security

Results: 220



#Item
21Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
22Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
23Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
24Cryptography / Homomorphic encryption / Paillier cryptosystem / Probabilistic encryption / Block cipher / Encryption / Ciphertext indistinguishability / Cloud computing security / Blowfish / ElGamal encryption / GoldwasserMicali cryptosystem / Initialization vector

Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-09-17 04:43:33
25Domain name system / Internet / Computing / Domain Name System Security Extensions / Domain name registrar / Domain name / Top-level domain / .org / Root name server / Generic top-level domain / Verisign / Country code top-level domain

VRSN_logo_vertical_CMYK_reverse_vector

Add to Reading List

Source URL: www.verisign.com

Language: English
26Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
27Cryptography / Block cipher modes of operation / Ciphertext stealing / Ciphertext / Symmetric-key algorithm / Initialization vector

The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-03-23 10:23:39
28Philosophy of biology / Homomorphic encryption / Genetic epidemiology / Abstract algebra / Single-nucleotide polymorphism / Genetic association / Genome-wide association study / Cloud computing / Euclidean vector / Biology / Genetics / Cryptography

2015 IEEE CS Security and Privacy Workshops Efficient Secure Outsourcing of Genome-wide Association Studies Wenjie Lu

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:25:06
29Routing protocols / Routing / Internet protocols / Internet standards / Computer networking / Border Gateway Protocol / IP hijacking / Router / Path vector protocol / Network architecture / Computing / Internet

1 A Survey of BGP Security Issues and Solutions Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford Abstract

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2008-09-21 13:02:46
30Machine learning / Artificial intelligence / Malware / Classifier / Learning / Support vector machine / Ensemble learning / Statistics / Statistical classification / Parts of speech

Poster: Automatically Evading Classifiers A Case Study on Structural Feature-based PDF Malware Classifiers Weilin Xu, Yanjun Qi, and David Evans University of Virginia {xuweilin, yanjun, evans}@virginia.edu Abstract—Ma

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:34
UPDATE