Computer security

Results: 47159



#Item
91

A birthday present every eleven wallets? The security of customer-chosen banking PINs Joseph Bonneau, S¨oren Preibusch, Ross Anderson Computer Laboratory University of Cambridge {jcb82,sdp36,rja14}@cl.cam.ac.uk

Add to Reading List

Source URL: preibusch.de

Language: English - Date: 2012-03-06 07:30:26
    92

    CALL FOR PAPERS (STAST3rd International Workshop on Socio-Technical Aspects in Security and Trust http://www.stast2013.uni.lu Co-located with 2013 IEEE 26th Computer Security Foundation Symposium

    Add to Reading List

    Source URL: stast2013.uni.lu

    Language: English - Date: 2013-04-13 18:55:47
      93

      Science of Security Meeting, Berkeley CA, 17, 18 Nov 2008 Security and Composition John Rushby Computer Science Laboratory

      Add to Reading List

      Source URL: sos.cs.virginia.edu

      Language: English - Date: 2008-11-19 23:30:14
        94

        Proceedings on Privacy Enhancing Technologies ; ):1–18 Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism

        Add to Reading List

        Source URL: www.franziroesner.com

        Language: English - Date: 2016-06-02 16:32:37
          95

          CS461/ECE422 Computer Security I November 11, 2015 Project 5: Forensics

          Add to Reading List

          Source URL: courses.engr.illinois.edu

          Language: English - Date: 2015-12-04 12:59:10
            96

            Cutoff Bounds for Consensus Algorithms Ognjen Marić, Christoph Sprenger, and David Basin Institute of Information Security Department of Computer Science, ETH Zurich Abstract. Consensus algorithms are fundamental build

            Add to Reading List

            Source URL: people.inf.ethz.ch

            Language: English - Date: 2017-09-15 08:25:25
              97

              Evaluating Automated Facial Age Estimation Techniques for Digital Forensics Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon Forensics and Security Research Group School of Computer Science University College Dub

              Add to Reading List

              Source URL: forensicsandsecurity.com

              Language: English - Date: 2018-03-29 07:05:28
                98

                Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 1 February 4, 2014

                Add to Reading List

                Source URL: courses.csail.mit.edu

                Language: English
                  99

                  REGISTRATION DOCUMENT SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

                  Add to Reading List

                  Source URL: www.youthfund.go.ke

                  Language: English - Date: 2017-05-24 13:41:29
                    100

                    2016 IEEE 29th Computer Security Foundations Symposium Correlated Secrets in Quantitative Information Flow Nicol´as E. Bordenabe Geoffrey Smith

                    Add to Reading List

                    Source URL: users.cis.fiu.edu

                    Language: English - Date: 2017-08-28 12:01:04
                      UPDATE