Secure coding

Results: 94



#Item
41Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1  2

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
42Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Sotokanda, Chiyo

Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Sotokanda, Chiyo

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 09:16:20
43www.nyphp.com / www.nyphp.org  PHundamental Security Ecosystem Review, Coding Secure with PHP, and Best Practices

www.nyphp.com / www.nyphp.org PHundamental Security Ecosystem Review, Coding Secure with PHP, and Best Practices

Add to Reading List

Source URL: nyphp.org

Language: English - Date: 2015-05-18 07:22:09
44WIREDRIVE CHECKMARX’S Case Study About the Company founded inThe Wiredrive team consists of 35 employees and has

WIREDRIVE CHECKMARX’S Case Study About the Company founded inThe Wiredrive team consists of 35 employees and has

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2015-02-26 02:03:44
45Securing Java Web Applications  This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authenticat

Securing Java Web Applications This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authenticat

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-12-29 13:10:38
46White paper  The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

White paper The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2015-04-01 08:31:14
47On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:20:25
48Mathematics / Information / Fingerprint / List decoding / Concatenated error correction code / Reed–Solomon error correction / Digital video fingerprinting / Coding theory / Error detection and correction / Theoretical computer science

On watermarking/fingerprinting for copyright protection Hans Georg Schaathun Abstract Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorised

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2005-12-08 10:13:37
49August 26, 2002  TR CS[removed]Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks

August 26, 2002 TR CS[removed]Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2002-09-16 11:44:39
501  Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40