Computer security

Results: 47159



#Item
51Computing / Computer access control / Computer security / Cloud standards / Federated identity / Internet protocols / Cryptographic protocols / OAuth / Cross-site request forgery / Social login / OpenID / Single sign-on

Journal of Computer Security–657 DOIJCSIOS Press 601

Add to Reading List

Source URL: wwwhomes.doc.ic.ac.uk

Language: English - Date: 2014-05-01 06:38:12
52

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2016-09-27 09:25:21
    53

    Learning from Early Attempts to Measure Information Security Performance Jing Zhang1 , Robin Berthier2 , Will Rhee3 , Michael Bailey1 , Partha Pal4 , Farnam Jahanian1 , and William H. Sanders2 1 Dept. of Computer Scienc

    Add to Reading List

    Source URL: nsrg.ece.illinois.edu

    Language: English - Date: 2018-06-11 12:51:20
      54

      INSERT YOUR ORGANIZATION NAME PROTECT YOUR STUFF: GET COMPUTER UPDATES. SECURITY UPDATES DO MORE THAN JUST PROTECT YOUR COMPUTER AGAINST THE LATEST WORMS, VIRUSES, HACKS, AND OTHER INTERNET VILLAINS. THEY PROTECT YOUR P

      Add to Reading List

      Source URL: infosec.ohio.gov

      - Date: 2015-10-01 13:47:36
        55

        Developing Security Protocols by Refinement Christoph Sprenger David Basin Dept. of Computer Science

        Add to Reading List

        Source URL: people.inf.ethz.ch

        Language: English - Date: 2014-04-16 16:25:47
          56

          High System-Code Security with Low Overhead Jonas Wagner∗ , Volodymyr Kuznetsov∗ , George Candea∗ , and Johannes Kinder† ∗ School of Computer and Communication Sciences École Polytechnique Fédérale de Lausan

          Add to Reading List

          Source URL: dslab.epfl.ch

          Language: English - Date: 2018-08-14 09:29:24
            57

            Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 3 February 23, 2015

            Add to Reading List

            Source URL: courses.csail.mit.edu

            Language: English
              58

              Published at the 2017 USENIX Security Symposium; addition information at https://dnasec.cs.washington.edu/. Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and

              Add to Reading List

              Source URL: dnasec.cs.washington.edu

              Language: English - Date: 2017-08-09 23:52:51
                59

                “Oops, I did it again” – Security of One-Time Signatures under Two-Message Attacks Leon Groot Bruinderink and Andreas Hülsing Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O.

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2017-09-25 03:25:51
                  UPDATE