1![Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha](https://www.pdfsearch.io/img/2ca10fba8a001c9a9cdfbb283c381dff.jpg) | Add to Reading ListSource URL: backdoortolerance.orgLanguage: English - Date: 2018-03-13 07:04:44
|
---|
2![Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con](https://www.pdfsearch.io/img/44d88fb638c8dac286b2fa7a1f8e652d.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-15 11:54:40
|
---|
3![Monthly Labour Economics Report for May 2016 Summary on Labour Economic Conditions Employment in the labour market for May 2016, showed employment of 10,347,954 workers in the social security system (Section 33), a 2.80 Monthly Labour Economics Report for May 2016 Summary on Labour Economic Conditions Employment in the labour market for May 2016, showed employment of 10,347,954 workers in the social security system (Section 33), a 2.80](https://www.pdfsearch.io/img/b96e4244b9fdec2c494bc0fc0a639d87.jpg) | Add to Reading ListSource URL: www.mol.go.thLanguage: English - Date: 2016-07-12 09:04:39
|
---|
4![Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science](https://www.pdfsearch.io/img/c4895d09a9e90f6d94f2801841c74150.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-05 07:38:02
|
---|
5![CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees Thomas Bauereiß∗ , Armando Pesenti Gritti† , Andrei Popescu‡§ , Franco Raimondi‡ ∗ German Research Center for A CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees Thomas Bauereiß∗ , Armando Pesenti Gritti† , Andrei Popescu‡§ , Franco Raimondi‡ ∗ German Research Center for A](https://www.pdfsearch.io/img/c717133c83549641701f8e6f0305a7c0.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:56:37
|
---|
6![Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl](https://www.pdfsearch.io/img/0ce71d16bf24088654323a9a9cc6fffe.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-15 19:28:54
|
---|
7![SharesPost Announces Launch of ATS for Secondary Trading of Security Tokens SharesPost expects security token exchange platform to be available in H2 2018 May 14, San Francisco, CA - SharesPost, a leading provider SharesPost Announces Launch of ATS for Secondary Trading of Security Tokens SharesPost expects security token exchange platform to be available in H2 2018 May 14, San Francisco, CA - SharesPost, a leading provider](https://www.pdfsearch.io/img/1967e0ffc3066ff4839d665f5ff5ea32.jpg) | Add to Reading ListSource URL: d2wbqcispjulqi.cloudfront.netLanguage: English - Date: 2018-09-05 18:55:16
|
---|
8![Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen](https://www.pdfsearch.io/img/f842e7c3036a28238e60cf4c01d18c99.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-06-21 13:36:21
|
---|
9![Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†* Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*](https://www.pdfsearch.io/img/f03c78c17a550f3e250809701dae29b6.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:59
|
---|
10![2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University 2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University](https://www.pdfsearch.io/img/f4717def5487312c26e2a59c8be640f1.jpg) | Add to Reading ListSource URL: mxia.meLanguage: English - Date: 2017-02-08 07:01:32
|
---|