Security engineering

Results: 11317



#Item
41International Journal of Engineering and Technical Research (IJETR) ISSN: , Volume-2, Issue-12, December 2014 A survey on providing security to the wireless sensor networks integrated with IOT Meghana D K, Monic

International Journal of Engineering and Technical Research (IJETR) ISSN: , Volume-2, Issue-12, December 2014 A survey on providing security to the wireless sensor networks integrated with IOT Meghana D K, Monic

Add to Reading List

Source URL: www.erpublication.org

- Date: 2014-12-31 11:06:13
    42Behind the Scenes with iOS Security Black Hat 2016 Ivan Krstić Head of Security Engineering and Architecture, Apple

    Behind the Scenes with iOS Security Black Hat 2016 Ivan Krstić Head of Security Engineering and Architecture, Apple

    Add to Reading List

    Source URL: www.blackhat.com

    - Date: 2016-08-08 16:57:06
      43Physical Security Monitoring of Engineering Structures  Telelot VDD2/3 v4

      Physical Security Monitoring of Engineering Structures Telelot VDD2/3 v4

      Add to Reading List

      Source URL: www.huggenberger.com

      - Date: 2014-06-11 08:00:50
        44Management and Production Engineering Selected subjects for Management and Production Engineering:  Specialisations: production and service management, security management, quality management

        Management and Production Engineering Selected subjects for Management and Production Engineering: Specialisations: production and service management, security management, quality management

        Add to Reading List

        Source URL: www.pwsz.nysa.pl

        - Date: 2012-10-25 03:08:57
          45On the design of lightweight link-layer security mechanisms in IoT systems S. Sciancalepore∗ , A. Capossele† , G. Piro∗ , G. Boggia∗ and G. Bianchi‡ ∗ Dep.  of Electrical and Information Engineering (DEI), Po

          On the design of lightweight link-layer security mechanisms in IoT systems S. Sciancalepore∗ , A. Capossele† , G. Piro∗ , G. Boggia∗ and G. Bianchi‡ ∗ Dep. of Electrical and Information Engineering (DEI), Po

          Add to Reading List

          Source URL: pdfs.semanticscholar.org

          - Date: 2015-08-11 19:03:22
            46Constrained Verifiable Random Functions from Indistinguishability Obfuscation Bei Liang, Hongda Li, Jinyong Chang State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sci

            Constrained Verifiable Random Functions from Indistinguishability Obfuscation Bei Liang, Hongda Li, Jinyong Chang State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sci

            Add to Reading List

            Source URL: security-lab.jaist.ac.jp

            - Date: 2015-11-22 02:25:22
              47Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

              Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

              Add to Reading List

              Source URL: www.pcisecuritystandards.org

              - Date: 2015-08-24 10:06:28
                48Closer to metal: Reverse engineering the Broadcom NetExtreme’s firmware Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

                Closer to metal: Reverse engineering the Broadcom NetExtreme’s firmware Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

                Add to Reading List

                Source URL: esec-lab.sogeti.com

                - Date: 2016-07-01 12:08:46
                  49Need to hire tech, IT, engineering, and security-clearance professionals? Take advantage of the team that knows the language and habits of these unique candidates. We provide one of the easiest and most cost-effective wa

                  Need to hire tech, IT, engineering, and security-clearance professionals? Take advantage of the team that knows the language and habits of these unique candidates. We provide one of the easiest and most cost-effective wa

                  Add to Reading List

                  Source URL: www.targetedjobfairs.com

                  - Date: 2016-06-07 10:19:07
                    50Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann

                    Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann

                    Add to Reading List

                    Source URL: jon.oberheide.org

                    - Date: 2015-10-11 18:23:19