Computer security

Results: 47159



#Item
21Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
22Security engineering / Computer security / Human behavior / Computer network security / Data security / Cryptography / National security / Asset / Threat / Countermeasure / Paranoia / Security

EECS 388 Intro to Computer Security September 6, 2016 Homework 1: Rational Paranoia

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
23Intellectual property law / Copyright law / Data / Copyright law of the United States / Copyright / Derivative work / Institute of Electrical and Electronics Engineers / Law / Author / Information / Copyright Act of Ghana / Authorship and ownership in copyright law in Canada

IEEE COPYRIGHT LICENSE FORM FOR LIMITED USE WITH IEEE COMPUTER SOCIETY’S EXPERIMENTAL “DELAYED-OPEN ACCESS” MODEL TITLE OF WORK (hereinafter, "the Work"): AUTHOR(S): IEEE PUBLICATION TITLE: 2017 IEEE Symposium on S

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-03-16 07:17:53
24Computing / Computer architecture / System software / Recall / Android / Pattern / Short-term memory / Student's t-test

SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:19
25Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
26Computing / Software engineering / Computer programming / Software bugs / Shellcode / Debuggers / GNU Debugger / Debugging / Stack buffer overflow / Buffer overflow / Python / Stack

EECS 388 Intro to Computer Security October 28, 2016 Project 4: Application Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
27Cryptography / Stream ciphers / Vigenre cipher / Ciphertext / Cryptanalysis / Caesar cipher

EECS 388 Intro to Computer Security September 16, 2016 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
28Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-25 08:06:46
29Humancomputer interaction / Reality / Computing / User interface techniques / Augmented reality / Mixed reality / Virtual reality / Multimodal interaction / Microsoft HoloLens / Head-mounted display / Internet privacy / JavaScript

1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:40
30Computing / Computer access control / Computer security / Cloud standards / Federated identity / Internet protocols / Cryptographic protocols / OAuth / Cross-site request forgery / Social login / OpenID / Single sign-on

Journal of Computer Security–657 DOIJCSIOS Press 601

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-05-01 06:38:12
UPDATE