Computer security

Results: 47159



#Item
11Domain name system / Internet / Internet Standards / Network architecture / Computing / Domain Name System Security Extensions / Name server / Domain name / Root name server / WHOIS / Fully qualified domain name / Second-level domain

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
12Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:11:56
13Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
14Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
15Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:27
16Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
17Computing / Software engineering / Computer security / Hacking / Cross-site scripting / Cross-site request forgery / Security / JavaScript / SQL injection / HTTP cookie / Code injection / World Wide Web

EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
18System software / Software / Utility software / Computer forensics / Password / Security / Disk image / VirtualBox / Autopsy / File system / Forensic science

EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
19Computing / Software / System software / Computer network security / Wireless networking / IEEE 802.11 / Web scraping / Wireshark / Pcap / Aircrack-ng / Packet analyzer / Transmission Control Protocol

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
20Cryptocurrencies / Alternative currencies / Economy / Money / Bitcoin / Blockchains / Computing / Decentralization / Ethereum / Digital currency / Proof-of-stake / Draft:Nihilo Blockchain Introduction

Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

Add to Reading List

Source URL: s3-ap-southeast-1.amazonaws.com

Language: English - Date: 2018-10-12 03:26:38
UPDATE