Computer security conference

Results: 514



#Item
61

ACM  Digital  Identity  Management  (DIM)  2013   Friday, 8 th November 2013 held in conjunction with the 20th ACM Conference on Computer and Communications Security (ACM CCSContact: acmdim2013@e

Add to Reading List

Source URL: cccs.ncl.ac.uk

Language: English - Date: 2013-07-29 05:02:39
    62Computer network security / CVSS / Security / Vulnerability / Social vulnerability / Qualys / Metric / Computer security / Cyberwarfare / Risk

    The Common Vulnerability Scoring System Mike Schiffman, Cisco Systems The RSA Conference, February 2005 Today’s Agenda

    Add to Reading List

    Source URL: packetfactory.openwall.net

    Language: English - Date: 2005-02-23 13:47:09
    63System software / Android / Consumerization / Cloud computing / IOS / Sandbox / Rooting / Mobile application development / Rootkit / Computing / Smartphones / Software

    in conjunction with the 18th ACM Conference on Computer and Communications Security (CCS) October, SWISSÔTEL Chicago, Chicago, IL Mobile devices such as smartphones and Internet tablets have achieved computin

    Add to Reading List

    Source URL: www.cs.ncsu.edu

    Language: English - Date: 2011-06-01 10:34:31
    64Merchant services / Financial services / Fee / Visa Inc. / Card security code / MasterCard / Ticket / Credit cards / Electronic commerce / Business

    Computer Graphics International 2013 Conference Registration *: Required Field General Information – At least one author of each paper has to pay the full fee, even students Registration Type*: Full One Day Ticket

    Add to Reading List

    Source URL: cgi2013.welfenlab.de

    Language: English - Date: 2014-08-14 09:32:51
    65University of Duisburg-Essen / Siemens / Robert Bosch GmbH / Computer security / Technology / Economy of Germany / Internet protocol suite

    Overview Registration Date of the conference:

    Add to Reading List

    Source URL: www.eusas.ch

    Language: English - Date: 2013-07-23 02:10:04
    66Science / ISO standards / Electronic commerce / Wireless / Computer network security / Oberthur Technologies / Smart card / Cryptography / Ambient intelligence / Ubiquitous computing / Technology / Security

    13th Smart Card Research and Advanced Application Conference November 5-7, 2014 Program chairs Marc Joye Technicolor

    Add to Reading List

    Source URL: cedric.cnam.fr

    Language: English - Date: 2014-09-24 11:26:24
    67Hewlett-Packard / Food Technology / Email / Food security / Computing / Technology / Computer hardware

    Food Technology4th International Conference and Exhibition on Food Processing & Technology London, UK

    Add to Reading List

    Source URL: www.omicsgroup.com

    Language: English - Date: 2015-05-14 02:12:06
    68Bioinformatics / Machine learning / Biometrics / Human–computer interaction / K-nearest neighbor algorithm / Speech recognition / Hidden Markov model / Supervised learning / Electrical grid / Artificial intelligence / Security / Search algorithms

    2014 22nd International Conference on Pattern Recognition Behavioural biometrics using electricity load profiles M. Bicego, F. Recchia, A. Farinelli S. D. Ramchurn

    Add to Reading List

    Source URL: profs.sci.univr.it

    Language: English - Date: 2015-06-16 09:42:08
    69

    In 18th ACM Conference on Computer and Communications Security, Chicago, OctoberAutomated Black-Box Detection of Side-Channel Vulnerabilities in Web Applications Peter Chapman

    Add to Reading List

    Source URL: www.cs.virginia.edu

    - Date: 2011-08-11 12:18:39
      70

      CCS 2007 Corporate Contributions About CCS ACM Conference on Computer and Communications Security (CCS) is ACM’s oldest conference in security area. The conference was initiated inSince then it has been held twi

      Add to Reading List

      Source URL: www.sigsac.org

      - Date: 2007-06-05 01:51:10
        UPDATE