Computer security

Results: 47159



#Item
1Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang  Department of Computer Science

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 07:38:02
2EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
3Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:45
    4EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

    EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:20
    5HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

    HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 23:38:22
    6die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Bankenskandale Bluetooth Security

    die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Bankenskandale Bluetooth Security

    Add to Reading List

    Source URL: ds.ccc.de

    Language: German - Date: 2006-02-07 23:55:37
      7Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

      Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

      Add to Reading List

      Source URL: cohney.info

      Language: English - Date: 2018-09-29 19:30:48
      8Paxson Spring 2017 CS 161 Computer Security

      Paxson Spring 2017 CS 161 Computer Security

      Add to Reading List

      Source URL: www-inst.cs.berkeley.edu

      Language: English - Date: 2017-08-25 10:56:26
      9EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

      EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:22
      10EECS 388 Intro to Computer Security November 11, 2016 Homework 5: Exam Review

      EECS 388 Intro to Computer Security November 11, 2016 Homework 5: Exam Review

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:22