Computer security

Results: 47159



#Item
121

On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada

Add to Reading List

Source URL: cacr.uwaterloo.ca

- Date: 2011-07-10 02:35:14
    122

    (IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke

    Add to Reading List

    Source URL: www.ics.forth.gr

    - Date: 2012-03-22 09:28:00
      123

      MEDIA PACK About Graham Cluley and grahamcluley.com Graham Cluley is one of the most well-known experts of the computer security industry – having worked in senior technical roles at the likes of Sophos, McAfee and Dr

      Add to Reading List

      Source URL: cdn.grahamcluley.com

      - Date: 2016-09-15 07:51:21
        124

        Grailog 1.0: Graph-Logic Visualization of Ontologies and Rules Harold Boley National Research Council, Security and Disruptive Technologies University of New Brunswick, Faculty of Computer Science Fredericton, NB, Canada

        Add to Reading List

        Source URL: cs.unb.ca

        - Date: 2013-05-12 19:46:42
          125

          Security Analysis of the Diebold AccuVote-TS Voting Machine Ariel J. Feldman* , J. Alex Halderman* , and Edward W. Felten*,† * Center for Information Technology Policy and Dept. of Computer Science, Princeton Universit

          Add to Reading List

          Source URL: www.usenix.org

          - Date: 2007-07-03 10:25:07
            126

            Identity Finder Student Initiative Security Tips In the spirit of the upcoming holiday season we are also providing you with a few tips to stay safe while shopping online and to protect your computer. We hope this “Top

            Add to Reading List

            Source URL: www.identityfinder.com

            - Date: 2011-03-16 16:28:34
              127

              Marco Cova C ONTACT I NFORMATION Computer Security Group Department of Computer Science

              Add to Reading List

              Source URL: votingsystems.cdn.sos.ca.gov

              - Date: 2014-12-02 18:19:27
                128

                On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

                Add to Reading List

                Source URL: www.patrickmcdaniel.org

                - Date: 2016-11-26 07:36:40
                  129

                  Computer Communication & Collaboration (Vol. 3, Issue 4, 2015) ISSNPrintOnline) Submitted on Nov. 21, 2015 (DOIC: Personal Information Security and the IoT: The Changing

                  Add to Reading List

                  Source URL: www.bapress.ca

                  - Date: 2015-12-04 16:21:15
                    130

                    Math Department Computer Lab Policy (effective) • For security reasons, the lab coordinator or a lab employee must be present any time

                    Add to Reading List

                    Source URL: gato-docs.its.txstate.edu

                    - Date: 2016-05-05 09:09:00
                      UPDATE