Secure coding

Results: 94



#Item
41Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
42Estimation theory / Fixed effects model / Regression analysis / Coding theory / Communication / Error detection and correction

Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Sotokanda, Chiyo

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 09:16:20
43Computer programming / Cross-platform software / Initialisms / PHP / Software / Computing / PHP programming language

www.nyphp.com / www.nyphp.org PHundamental Security Ecosystem Review, Coding Secure with PHP, and Best Practices

Add to Reading List

Source URL: nyphp.org

Language: English - Date: 2015-05-18 07:22:09
44Software testing / Security / Electronic commerce / National security / Penetration test / Vulnerability / Secure coding / Computer network security / Computer security / Cyberwarfare

WIREDRIVE CHECKMARX’S Case Study About the Company founded inThe Wiredrive team consists of 35 employees and has

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2015-02-26 02:03:44
45Secure communication / Cryptographic protocols / HTTP / Electronic commerce / Java platform / Digest access authentication / HTTP Secure / Certificate authority / Cross-site scripting / Cryptography / Security / Computing

Securing Java Web Applications This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authenticat

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-12-29 13:10:38
46Computing / Computer network security / Hacking / Software bugs / Application security / Vulnerability / Penetration test / Attack patterns / Secure coding / Software testing / Computer security / Cyberwarfare

White paper The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2015-04-01 08:31:14
47Mathematics / Theoretical computer science / Information / Information theory / Computational complexity theory / List decoding / Concatenated error correction code / BCH code / Chernoff bound / Coding theory / Error detection and correction / Finite fields

On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:20:25
48Mathematics / Information / Fingerprint / List decoding / Concatenated error correction code / Reed–Solomon error correction / Digital video fingerprinting / Coding theory / Error detection and correction / Theoretical computer science

On watermarking/fingerprinting for copyright protection Hans Georg Schaathun Abstract Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorised

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2005-12-08 10:13:37
49Mathematics / Computing / Wireless networking / Sensor node / Flow network / Maximum flow problem / ANT / Secure Data Aggregation in WSN / Network coding / Wireless sensor network / Network flow / Technology

August 26, 2002 TR CS[removed]Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2002-09-16 11:44:39
50Public-key cryptography / Finite fields / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Goppa code / Linear code / Reed–Solomon error correction / Forward error correction / Cryptography / Coding theory / Error detection and correction

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
UPDATE