Security University

Results: 12075



#Item
181

On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada

Add to Reading List

Source URL: cacr.uwaterloo.ca

- Date: 2011-07-10 02:35:14
    182

    C O M P U T ER S C I E N C E DEPARTMENT COLLOQUIUM Multimedia Intelligence in Forensics and Security Dr. Chengcui Zhang University of Alabama at Birmingham

    Add to Reading List

    Source URL: pdf.cs.ua.edu

    - Date: 2012-08-29 09:30:04
      183

      Poster: Secure Gale-Shapley Efficient Stable Matching for Multi-Party Computation Jack Doerner University of Virginia

      Add to Reading List

      Source URL: www.ieee-security.org

      - Date: 2016-05-18 07:17:44
        184

        Edith Cowan University Research Online Australian Information Security Management Conference

        Add to Reading List

        Source URL: data.openduck.com

        - Date: 2014-01-14 02:48:40
          185

          CASE STUDY Sardar Patel University allows no IT Threat to go Undetected in its Network thanks to the Advanced Features and Technical Support of Seqrite Endpoint Security

          Add to Reading List

          Source URL: dlupdate.quickheal.com

          - Date: 2016-02-24 03:57:36
            186

            Poster: Secure Multi-Party Computation as a Tool for Privacy-Preserving Data Analysis Samuel Havron University of Virginia

            Add to Reading List

            Source URL: www.ieee-security.org

            - Date: 2016-05-18 07:17:44
              187

              Grailog 1.0: Graph-Logic Visualization of Ontologies and Rules Harold Boley National Research Council, Security and Disruptive Technologies University of New Brunswick, Faculty of Computer Science Fredericton, NB, Canada

              Add to Reading List

              Source URL: cs.unb.ca

              - Date: 2013-05-12 19:46:42
                188

                In Network and Distributed System Security SymposiumNDSS), San Diego, FebruaryAutomatically Evading Classifiers A Case Study on PDF Malware Classifiers Weilin Xu, Yanjun Qi, and David Evans University of Vi

                Add to Reading List

                Source URL: evademl.org

                - Date: 2016-12-14 13:42:25
                  189

                  FRESCO: Modular Composable Security Services for Software-Defined Networks Seugwon Shin1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Guofei Gu1 , Mabry Tyson2 (1) Texas A&M University College Station, TX 7784

                  Add to Reading List

                  Source URL: faculty.cse.tamu.edu

                  - Date: 2013-01-11 10:29:14
                    190

                    Black Hat USABad Memories Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt, Dan Boneh Stanford University Security Laboratory

                    Add to Reading List

                    Source URL: media.blackhat.com

                    - Date: 2012-04-07 14:53:10
                      UPDATE