Computer security conference

Results: 514



#Item
501Electronic commerce / Cyberwarfare / Data security / Crime prevention / National security / Virtual enterprise / Information security / Authentication / Firewall / Security / Computer network security / Cryptography

Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 Virtual Enterprise Security:

Add to Reading List

Source URL: www.wseas.us

Language: English - Date: 2007-01-03 11:27:45
502Consumer electronics / Information science / Electronics / Information technology audit / Information / Computer forensics / VOB / IFO / Forensic science / Filename extensions / Digital forensics / DVD

Proceedings of the Eleventh Australasian Information Security Conference (AISC 2013), Adelaide, Australia Digital Camcorder Forensics

Add to Reading List

Source URL: www.crpit.com

Language: English - Date: 2013-05-24 03:13:26
503Electronic warfare / Computer crimes / Cyberwarfare

Global Cyber Security Capacity Centre Opening and Inaugural Conference Oxford Martin School, University of Oxford 25 November 2013

Add to Reading List

Source URL: www.oxfordmartin.ox.ac.uk

Language: English - Date: 2013-11-26 08:52:01
504War / Government / Electronic warfare / Military technology / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / National security / Legal aspects of computing / Rafal Rohozinski / Cyberwarfare / Computer crimes / United States Department of Homeland Security

Global Cyber Security Capacity Centre Opening and Inaugural Conference Oxford Martin School, University of Oxford 25 November 2013

Add to Reading List

Source URL: www.oxfordmartin.ox.ac.uk

Language: English - Date: 2013-11-26 08:52:30
505Computer crimes / Cyberwarfare / Marcus Sachs / Doctoral Training Centre / Higher education in the United Kingdom / United States Department of Homeland Security

Global Cyber Security Capacity Centre Opening and Inaugural Conference Oxford Martin School, University of Oxford, 25 November 2013 Participant List

Add to Reading List

Source URL: www.oxfordmartin.ox.ac.uk

Language: English - Date: 2013-11-26 08:38:43
506Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Randomized algorithm / Blum Blum Shub / Information theory / XTR / Theoretical computer science / Applied mathematics / Mathematics

Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science[removed]–375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-02-27 04:40:52
507System software / Internet / Data security / Firewall / Internet censorship / Great Firewall of China / Ping / Router / Google China / Computer network security / Computing / Cyberwarfare

This paper will appear at the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 2, 2007

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2007-09-12 11:58:26
508Computing / Input/output / Computational linguistics / User interface techniques / Computer keyboard / Linear classifier / Typing / Speech recognition / Supervised learning / Machine learning / Statistics / Human–computer interaction

In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005, pp[removed]Keyboard Acoustic Emanations Revisited

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2011-08-17 19:42:41
509Computing / Input/output / Computational linguistics / User interface techniques / Computer keyboard / Linear classifier / Typing / Speech recognition / Supervised learning / Machine learning / Statistics / Human–computer interaction

In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005, pp[removed]Keyboard Acoustic Emanations Revisited

Add to Reading List

Source URL: www.tygar.net

Language: English - Date: 2006-03-31 18:45:14
510Middle States Association of Colleges and Schools / New York University / Hackers: Heroes of the Computer Revolution / Hacker ethic / Hacker / What the Hack / Tron / Enid Gabriella Coleman / Computer security conference / Computing / Electronics / Hacking

PDF Document

Add to Reading List

Source URL: steinhardt.nyu.edu

Language: English - Date: 2010-12-07 15:10:55
UPDATE