Computer security conference

Results: 514



#Item
151Proof theory / Zero-knowledge proof / Interactive proof system / Commitment scheme / IP / Soundness / Probabilistically checkable proof / Random oracle / Symbol / Cryptography / Theoretical computer science / Cryptographic protocols

— A merged version of this work and the work of [BGW12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 13:39:52
152Puzzles / Mechanical puzzles / Computer network security / Client Puzzle Protocol / Proof-of-work system

An extended abstract version of this work appears in: Aggelos Kiayias, editor, Topics in Cryptology – CT-RSA 2011 – The Cryptographers’ Track at the RSA Conference, LNCS, volume 6558, pp. 284–301. Springer, 2011.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-20 01:54:21
153Electronic commerce / Digital signature / Public key certificate / RSA / Group signature / BLS / Cryptography / Public-key cryptography / Key management

A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 276–285, S. De Capitani di Vimercati and P. Syverson eds., ACM Press, 2007. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-21 16:37:42
154Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics

An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 15:22:16
155Computer security / HTTP / HTTP cookie / Internet privacy / Clickjacking / Cookiejacking / Cross-site request forgery / Hacking / Computing / Social engineering

Cookiejacking Rosario Valotta Agenda !   Me, myself and I !   The IE security zones

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-28 00:11:29
156Malware / Rootkits / Shellcode / Hypervisor / Hacker / Antivirus software / Backdoor / Joanna Rutkowska / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / System software / Cyberwarfare / Computer security

[Black Hat DCAn Uninvited Guest Black Hat DC 2010 Conference Proceedings An Uninvited Guest (Who Won’t Go Home)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
157Computer network security / Crime prevention / National security / DevOps / Information technology management / Software development process / Recreational Software Advisory Council / Cloud computing / Computer security / Software development / Security / Computing

Reading the Tea Leaves of the 2015 RSA Conference Submissions Hugh Thompson Britta Glade

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-12-15 13:13:16
158Cyberwarfare / Computer network security / Data security / National security / Vulnerability / Physical security / Social engineering / Information security / Asset / Security / Computer security / Public safety

2013 IEEE International Conference on Cloud Computing Technology and Science Defining “The Weakest Link”: Comparative Security in Complex Systems of Systems Wolter Pieters TU Delft and University of Twente

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2014-04-03 05:54:29
159Crime prevention / Electronic commerce / National security / Secure communication / Data security / Public safety / Computer network security / Security / Computer security

Ciphertex to Showcase Innovative Data Security Solutions at 2014 High Technology Crime Investigation Association International Conference & Training Expo Ciphertex Data Security will attend the 2014 HTCIA International C

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-08-25 03:00:58
160Safety engineering / Security / Ian Sommerville / International Conference on Dependable Systems and Networks / HPR / Ambient intelligence / Proceedings / Academia / Computing / Dependability / Quality / Safety

DIRC Dependability of Computer-Based Systems List of Publications and Reports January 15, 2007 This document lists known citations to publications and Technical Reports for the first five years of DIRC. It was generated

Add to Reading List

Source URL: www.dirc.org.uk

Language: English - Date: 2007-01-15 09:28:11
UPDATE