Computer security

Results: 47159



#Item
71ECE 422/CS 461 Intro to Computer Security April 20, 2015 Homework 5: Exam Review

ECE 422/CS 461 Intro to Computer Security April 20, 2015 Homework 5: Exam Review

Add to Reading List

Source URL: courses.engr.illinois.edu

Language: English - Date: 2015-04-20 13:04:03
    72Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

    Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

    Add to Reading List

    Source URL: www.bmoeller.de

    Language: English - Date: 2006-01-02 00:25:23
      73Programming Language Methods in Computer Security John Mitchell Stanford University

      Programming Language Methods in Computer Security John Mitchell Stanford University

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2001-03-11 22:41:33
        74CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security

        CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security

        Add to Reading List

        Source URL: courses.engr.illinois.edu

        Language: English - Date: 2015-04-20 13:04:03
          75IEEE​ ​Security​ ​Development​ ​Conference​ ​(SecDev)​ ​2018 Call​ ​for​ ​Papers Sponsored​ ​by​ ​the​ ​IEEE​ ​Computer​ ​Society​ ​Technical​ ​Committee on​ ​S

          IEEE​ ​Security​ ​Development​ ​Conference​ ​(SecDev)​ ​2018 Call​ ​for​ ​Papers Sponsored​ ​by​ ​the​ ​IEEE​ ​Computer​ ​Society​ ​Technical​ ​Committee on​ ​S

          Add to Reading List

          Source URL: people.cs.vt.edu

          Language: English - Date: 2017-11-28 19:47:13
            76[INTERNATIONAL JOURNAL OF Computer Networks AND Communications Security] C Webpage: http://www.ijcncs.org E-mail:

            [INTERNATIONAL JOURNAL OF Computer Networks AND Communications Security] C Webpage: http://www.ijcncs.org E-mail:

            Add to Reading List

            Source URL: www.ijcncs.org

            Language: English - Date: 2013-06-30 10:24:15
              77A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012  Stig F. Mjølsnes

              A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes

              Add to Reading List

              Source URL: csf2012.seas.harvard.edu

              Language: English - Date: 2012-07-05 18:15:12
                78Published in D. Naccache, Ed., Cryptography and Security: From Theory to Applications (Quisquater Festschrift), volof Lecture Notes in Computer Science, pp. 3-7, Springer, 2012. On Quisquater’s Multiplication Al

                Published in D. Naccache, Ed., Cryptography and Security: From Theory to Applications (Quisquater Festschrift), volof Lecture Notes in Computer Science, pp. 3-7, Springer, 2012. On Quisquater’s Multiplication Al

                Add to Reading List

                Source URL: joye.site88.net

                Language: English - Date: 2015-09-04 19:43:51
                  792010 23rd IEEE Computer Security Foundations Symposium  Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

                  2010 23rd IEEE Computer Security Foundations Symposium Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

                  Add to Reading List

                  Source URL: users.cis.fiu.edu

                  Language: English - Date: 2014-09-02 15:19:21
                    80Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham  Security of cloud computing

                    Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

                    Add to Reading List

                    Source URL: www.cs.bham.ac.uk

                    Language: English - Date: 2011-06-20 08:16:21