Computer Security Institute

Results: 1676



#Item
291Data security / Software testing / Security / Hacking / Information security / National Institute for Smart Government / Penetration test / Hacker / Email / Computing / Computer security / Computer network security

JOB DESCRIPTION 1 Information Security Compliance In-charge 1.1

Add to Reading List

Source URL: nisg.org

Language: English - Date: 2014-07-24 08:44:55
292Internet / Steven M. Bellovin / Evil bit / Firewall / IPv6 / Matt Blaze / Usenet / Institute of Electrical and Electronics Engineers / Susan Landau / Computing / Computer network security / Cypherpunks

Steven M. Bellovin Percy K. and Vida L.W. Professor of Computer Science smb at cs.columbia.edu http://www.cs.columbia.edu/˜ smb Education

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2015-04-15 13:47:03
293Science and technology in Europe / Security / Military science / Institute for the Protection and Security of the Citizen / Ispra / Computer security / Technology / Radar / European Commission

Microsoft PowerPoint - LISA-Tsunami-Workshop.ppt

Add to Reading List

Source URL: tsunami.jrc.it

Language: English - Date: 2006-10-16 10:32:00
294Grants / Research / Association of American Universities / Carnegie Mellon University / Knowledge / Privacy / Electronic submission / Institute of Electrical and Electronics Engineers / Carnegie Mellon Silicon Valley / Ethics / Competitions / Digital media

Call for Papers Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. Th

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-08-14 14:31:01
295Computer security / Computing / Ethics / Data security / Computer network security / Cloud computing / National University of Singapore / Information security / Privacy / Security / Crime prevention / National security

STMI@NUS STRATEGIC TECHNOLOGY MANAGEMENT INSTITUTE NICF-Legal and Regulatory

Add to Reading List

Source URL: www.stmi.nus.edu.sg

Language: English - Date: 2013-01-29 04:37:55
296RSA / Server / Computing / Cyberwarfare / Security / Cryptography / Commitment scheme / Cloud computing

Non-Repudiable Provable Data Possession in Cloud Storage Hongyuan Wang, Liehuang Zhu, Yijia Lilong, and Chang Xu School of Computer, Being Institute of Technology, Beijing, China, 100081 {wanghongyuan, liehuangz, lilongy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 07:36:32
297Computer algebra / Numerical linear algebra / Finite fields / Algebraic geometry / Error detection and correction / Gröbner basis / Matrix / Hidden Field Equations / Gaussian elimination / Algebra / Mathematics / Abstract algebra

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-14 05:32:54
298De Bruijn sequence / Travelling salesman problem / Genetic algorithm / De Bruijn / Mutation / Bruijn / Koorde / Mathematics / Combinatorics / Graph theory

Evolutionary Construction of de Bruijn Sequences ∗ Meltem S¨ onmez Turan National Institute of Standards and Technology, Computer Security Division

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:45:08
299Computer network security / Electronic commerce / Computer arithmetic / Public-key cryptography / RSA / Client Puzzle Protocol / Modular exponentiation / Exponentiation by squaring / Abstract algebra / Mathematics / Modular arithmetic

Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, and Juan Gonzalez Nieto Information Security Institute, Queensland Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-08 12:13:25
300Security Content Automation Protocol / National Institute of Standards and Technology / Metadata repository / Data / Information / Computer security

An Enterprise Continuous Monitoring Technical Reference Model Overview Peter Sell, National Security Agency 

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:05
UPDATE