Computer Security Institute

Results: 1676



#Item
21Cryptography / Security / Computer access control / Federated identity / Identity documents / Cloud standards / E-commerce / Cloud computing security / Authentication / OpenID / Electronic identification / Internet privacy

Doubtless Identification and Privacy Pre-serving of User in Cloud Systems Antonio González Robles1 . Norbert Pohlmann1 . Christoph Engling2 . Hubert Jäger3 . Edmund Ernst3 Institute for Internet Security Westfälische

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:34:04
22Isis / Institute for Science and International Security / Computing / Computer architecture

Child Exploitation Investigation Toolkit Developed in conjunction between Isis Forensics and UK law enforcement the Child Exploitation Investigation Toolkit (CEIT) assists law enforcement officers in analysing the vast a

Add to Reading List

Source URL: www.isis-forensics.com

Language: English - Date: 2012-12-12 10:49:07
23Computing / Cryptography / Computer architecture / Computer network security / Shellcode / Data structure alignment / X86 / Kerberos / Transmission Control Protocol

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
24Computing / Software engineering / Computer architecture / Method / Data types / X86 architecture / Assembly languages / Virtual method table / Subroutines / X86 assembly language / Low-level programming language / Dangling pointer

¨ BOCHUM RUHR-UNIVERSITAT Horst G¨ortz Institute for IT Security Technical Report TR-HGI

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2014-12-17 10:12:31
25Computing / Inter-process communication / Transmission Control Protocol / Remote procedure call / Ur / Network file systems / Computer network security

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYDistributed System Engineering: FallQuiz I

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
26Security / Computer security / Cyberwarfare / Computer network security / Web applications / Cryptography / Secure communication / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
27Hypertext Transfer Protocol / Computer access control / Prevention / Computing / Security / Password / Transmission Control Protocol / HTTP cookie / HTTPS / Challengeresponse authentication

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
28Security / Computing / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Denial-of-service attack / Threat / Critical infrastructure protection / Internet / Vulnerability

An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:45
29Computer security / Cyberwarfare / Security / Cryptography / Antivirus software / Computer network security / Secure communication / Malware / Internet security / Vulnerability / Computer virus / Trusted computing base

The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 08:00:14
30Computing / Wireless networking / Security / Computer network security / Information technology management / Secure communication / Data security / Wireless sensor network / Steganography / Computer security / Artificial immune system / Quality of service

CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

Add to Reading List

Source URL: www.tifr.res.in

Language: English - Date: 2011-12-14 05:57:20
UPDATE