Security

Results: 374843



#Item
1Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Poster: Browser’s ”search form” issues and countermeasures Yuji Suga  Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 11:54:40
3Monthly Labour Economics Report for May 2016 Summary on Labour Economic Conditions Employment in the labour market for May 2016, showed employment of 10,347,954 workers in the social security system (Section 33), a 2.80

Monthly Labour Economics Report for May 2016 Summary on Labour Economic Conditions Employment in the labour market for May 2016, showed employment of 10,347,954 workers in the social security system (Section 33), a 2.80

Add to Reading List

Source URL: www.mol.go.th

Language: English - Date: 2016-07-12 09:04:39
4Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang  Department of Computer Science

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 07:38:02
5CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees Thomas Bauereiß∗ , Armando Pesenti Gritti† , Andrei Popescu‡§ , Franco Raimondi‡ ∗ German  Research Center for A

CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees Thomas Bauereiß∗ , Armando Pesenti Gritti† , Andrei Popescu‡§ , Franco Raimondi‡ ∗ German Research Center for A

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:37
    6Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

    Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 19:28:54
    7SharesPost Announces Launch of ATS for Secondary Trading of Security Tokens SharesPost expects security token exchange platform to be available in H2 2018 May 14, San Francisco, CA - SharesPost, a leading provider

    SharesPost Announces Launch of ATS for Secondary Trading of Security Tokens SharesPost expects security token exchange platform to be available in H2 2018 May 14, San Francisco, CA - SharesPost, a leading provider

    Add to Reading List

    Source URL: d2wbqcispjulqi.cloudfront.net

    Language: English - Date: 2018-09-05 18:55:16
    8Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

    Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-06-21 13:36:21
    9Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

    Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:59
    102015 IEEE Symposium on Security and Privacy  Effective Real-time Android Application Auditing Mingyuan Xia McGill University

    2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University

    Add to Reading List

    Source URL: mxia.me

    Language: English - Date: 2017-02-08 07:01:32