IEEE

Results: 22018



#Item
91Internet / Computing / Free software / Dark web / Secure communication / Tor / Point guard / Guard mounting

Poster: Guard Sets in Tor Using AS Relationships Mohsen Imani Armon Barton Matthew Wright

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-10 21:07:00
92Computing / Software / Cryptography / Transport Layer Security / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / Browser security / HTTPS / Public key certificate / Google Chrome / Firefox

Poster: Security Analysis of HSTS Implementation in Browsers Yan Jia1,2, Yuqing Zhang2,1 1 2

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-14 22:48:20
93Computing / Computer systems / Edsger W. Dijkstra / Software architecture / Software engineering / Scalability / Big data / Database / Information and communications technology / Computer engineering

INVITED SPEAKER SEMINAR IN ELECTRICAL AND COMPUTER ENGINEERING CO-SPONSORED BY: The Department of Electrical and Computer Engineering, Concordia University, IEEE Montreal Section,

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2014-04-11 16:22:00
94Genetics / Biology / Epigenetics / DNA / Genomics / Molecular biology / Genetic mapping / DNA methylation / Bisulfite sequencing / Methylation / CpG site / Bayesian tool for methylation analysis

Identifying Personal DNA Methylation Profiles by Genotype Inference Michael Backes∗ , Pascal Berrang∗ , Matthias Bieg† , Roland Eils†‡ , Carl Herrmann†‡ , Mathias Humbert∗ , Irina Lehmann§ ∗ CISPA,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:30
95Differential geometry of surfaces / Sensor

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL.X , NO.X , XXXX 201X 1 Surface Coverage in Sensor Networks Linghe Kong, Mingchen Zhao, Xiao-Yang Liu,

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:43
96Dimension reduction / Principal component analysis / Anomaly

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 22:38:18
97IEEE 802 / Wireless sensor network / Computing / Wireless / Wireless networking / Information and communications technology / Computer networking / Sensor node / DBm / IEEE 802.15 / Comparison of 802.15.4 radio modules / XBee

M ICAz WIRELESS MEASUREMENT SYSTEM • 2.4 GHz IEEE, Tiny Wireless Measurement System • Designed Specifically for Deeply

Add to Reading List

Source URL: www.memsic.com

Language: English - Date: 2013-01-30 19:19:11
98Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / E-commerce / Certificate authority / Public key certificate / X.509 / Certificate Transparency / Wildcard certificate / Certificate policy

IKP: Turning a PKI Around with Decentralized Automated Incentives Stephanos Matsumoto Raphael M. Reischuk

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:33
99Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:12
UPDATE