Computer security conference

Results: 514



#Item
1Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham  Security of cloud computing

Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2011-06-20 08:16:21
    2IEEE​ ​Security​ ​Development​ ​Conference​ ​(SecDev)​ ​2018 Call​ ​for​ ​Papers Sponsored​ ​by​ ​the​ ​IEEE​ ​Computer​ ​Society​ ​Technical​ ​Committee on​ ​S

    IEEE​ ​Security​ ​Development​ ​Conference​ ​(SecDev)​ ​2018 Call​ ​for​ ​Papers Sponsored​ ​by​ ​the​ ​IEEE​ ​Computer​ ​Society​ ​Technical​ ​Committee on​ ​S

    Add to Reading List

    Source URL: people.cs.vt.edu

    Language: English - Date: 2017-11-28 19:47:13
      3Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham  Security of cloud computing

      Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2011-06-20 08:16:21
        4Safely Measuring Tor “Safely Measuring Tor”, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCSRob Jansen

        Safely Measuring Tor “Safely Measuring Tor”, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCSRob Jansen

        Add to Reading List

        Source URL: www.robgjansen.com

        - Date: 2018-02-21 17:29:46
          5Sixth Annual Conference on Privacy, Security and Trust  A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

          Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

          Add to Reading List

          Source URL: rayb.info

          - Date: 2016-08-19 22:20:15
            6International Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification June 28-30, 2016 Espace du Centenaire, Maison de la RATP Paris, France

            International Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification June 28-30, 2016 Espace du Centenaire, Maison de la RATP Paris, France

            Add to Reading List

            Source URL: conferences.ncl.ac.uk

            Language: English - Date: 2016-03-07 04:22:54
            72015 Mobile Conference and Barcelona Gadget Show Good News Bad News New Gadgets & Interconnected Devices The biggest event on the tech calendar just took place in Barcelona. This is the next step towards the Internet of

            2015 Mobile Conference and Barcelona Gadget Show Good News Bad News New Gadgets & Interconnected Devices The biggest event on the tech calendar just took place in Barcelona. This is the next step towards the Internet of

            Add to Reading List

            Source URL: www.documentdestruction.mobi

            Language: English - Date: 2015-03-12 19:10:55
            8The AAAI-16 Workshop on  Artificial Intelligence for Cyber Security (AICS) February 12 or 13, 2016 Phoenix, Arizona, USA Part of the Association for the Advancement of Artificial Intelligence 2016 Conference

            The AAAI-16 Workshop on Artificial Intelligence for Cyber Security (AICS) February 12 or 13, 2016 Phoenix, Arizona, USA Part of the Association for the Advancement of Artificial Intelligence 2016 Conference

            Add to Reading List

            Source URL: www-bcf.usc.edu

            Language: English - Date: 2015-09-12 20:36:52
            9Second Workshop on Dependable Distributed Data Management affiliated with EuroSys 2008 Conference March 31, 2008, Glasgow, Scotland http://gorda.di.uminho.pt/wdddm08/ Program Chairs

            Second Workshop on Dependable Distributed Data Management affiliated with EuroSys 2008 Conference March 31, 2008, Glasgow, Scotland http://gorda.di.uminho.pt/wdddm08/ Program Chairs

            Add to Reading List

            Source URL: gorda.di.uminho.pt

            Language: English - Date: 2013-01-28 10:06:19