Computer security

Results: 47159



#Item
1Computing / Computer architecture / Android / System software / Online marketplaces / Google Play / Intent

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 07:38:02
2Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
3

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:45
    4Cryptography / Computer security / Cryptographic hash functions / Password / Rainbow table / SHA-2 / Password strength / Salt

    EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:20
    5Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

    HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 23:38:22
    6

    die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Bankenskandale Bluetooth Security

    Add to Reading List

    Source URL: ds.ccc.de

    Language: German - Date: 2006-02-07 23:55:37
      7Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

      Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

      Add to Reading List

      Source URL: cohney.info

      Language: English - Date: 2018-09-29 19:30:48
      8Computing / Software bugs / Software engineering / Computer security / Stack buffer overflow / Buffer overflow / Secure coding / Code injection / Uncontrolled format string / Off-by-one error / Memory safety / Pointer

      Paxson Spring 2017 CS 161 Computer Security

      Add to Reading List

      Source URL: www-inst.cs.berkeley.edu

      Language: English - Date: 2017-08-25 10:56:26
      9Cryptography / Cryptographic hash functions / HMAC / MD5 / Crypt / Collision attack / Padding / SHA-2 / MerkleDamgrd construction / SHA-1 / Hash function / Length extension attack

      EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:22
      10Cryptography / Cyberwarfare / Computer security / Key management / Public key infrastructure / Software bugs / Computer network security / E-commerce / Buffer overflow / HTTP cookie / Cross-site scripting / Certificate authority

      EECS 388 Intro to Computer Security November 11, 2016 Homework 5: Exam Review

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:22
      UPDATE