Vector Security

Results: 220



#Item
1Secure Your #1 Threat Vector  Crush Email Threats The biggest security vulnerability within any organization is its employees, and they are more often targeted through email than

Secure Your #1 Threat Vector Crush Email Threats The biggest security vulnerability within any organization is its employees, and they are more often targeted through email than

Add to Reading List

Source URL: mooresecureit.com

Language: English - Date: 2016-05-03 17:41:46
    2CUSTOMER STORY  BCC enhances its security measures with FireEye Solutions FireEye Platforms provide multi-vector protection

    CUSTOMER STORY BCC enhances its security measures with FireEye Solutions FireEye Platforms provide multi-vector protection

    Add to Reading List

    Source URL: www.fireeye.com

    Language: English - Date: 2018-08-09 02:18:29
      3Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

      Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

      Add to Reading List

      Source URL: mjwilber.org

      - Date: 2015-09-25 13:01:34
        4Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

        Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

        Add to Reading List

        Source URL: selabs.uk

          5Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

          Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

          Add to Reading List

          Source URL: selabs.uk

            6Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm Abstract. The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest

            Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm Abstract. The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest

            Add to Reading List

            Source URL: perso.ens-lyon.fr

            - Date: 2009-10-16 07:35:09
              72016 IEEE Symposium on Security and Privacy  Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector Erik Bosman Vrije Universiteit Amsterdam

              2016 IEEE Symposium on Security and Privacy Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector Erik Bosman Vrije Universiteit Amsterdam

              Add to Reading List

              Source URL: www.ieee-security.org

              - Date: 2016-04-21 14:49:34
                8AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

                AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

                Add to Reading List

                Source URL: web.cs.ucdavis.edu

                Language: English - Date: 2015-02-21 21:04:37
                9Caradoc: a Pragmatic Approach to PDF Parsing and Validation IEEE Security & Privacy LangSec Workshop 2016 Guillaume Endignoux Olivier Levillain Jean-Yves Migeon École Polytechnique, France

                Caradoc: a Pragmatic Approach to PDF Parsing and Validation IEEE Security & Privacy LangSec Workshop 2016 Guillaume Endignoux Olivier Levillain Jean-Yves Migeon École Polytechnique, France

                Add to Reading List

                Source URL: spw16.langsec.org

                Language: English - Date: 2016-06-05 23:39:17
                10An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

                An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

                Add to Reading List

                Source URL: web.cs.ucdavis.edu

                Language: English - Date: 2007-08-20 03:23:28