Security engineering

Results: 11317



#Item
581Software engineering / Computing / Programming language theory / Type theory / Variable / Information flow / ALGOL 68 / Assignment / Java

Security Domain Model and Implementation Modeling Language Reference Manual version 2.0 May 2008

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-05-12 17:29:24
582

Fusion and Inference from Multiple and Massive Disparate Data Sources Carey E. Priebe Johns Hopkins University National Security Science and Engineering Faculty Fellowship (NSSEFF) Program

Add to Reading List

Source URL: www.ams.jhu.edu

Language: English - Date: 2009-02-14 11:04:04
    583Computing / Software engineering / Security / Data loss prevention software / Data security / Information technology / Hypertext Transfer Protocol / Computer security / JavaScript / World Wide Web / POST

    DATA LEAKS Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? David Gugelmann | ETH Zurich

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2015-08-18 10:57:52
    584

    ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING∗ Marina Blanton and Mehrdad Aliasgari Department of Computer Science and Engineering, University of Notre Dame

    Add to Reading List

    Source URL: www.cse.nd.edu

    Language: English - Date: 2011-05-27 11:55:16
      585

      Social Engineering The easiest way to breach security is to obtain credentials, and the easiest way to get that information is to ask someone for it. The technique of tricking an individual into revealing secure informat

      Add to Reading List

      Source URL: www.busey.com

      Language: English - Date: 2013-10-25 09:45:08
        586Theoretical computer science / Formal methods / Computer science / Software engineering / Logic in computer science / Dependently typed programming / Proof assistants / Proof-carrying code / Formal verification / Mathematical proof / CurryHoward correspondence / Algorithm

        The Weird Machines in Proof-Carrying Code IEEE Security and Privacy LangSec Workshop 2014 Invited paper Julien Vanegue Bloomberg L.P. New York, USA.

        Add to Reading List

        Source URL: openwall.info

        Language: English - Date: 2014-10-13 00:40:06
        587Domain name system / Computing / Internet / Network architecture / Domain Name System Security Extensions / Name server / Root name server / PowerDNS / OpenDNS / Reverse DNS lookup / DNS root zone / Domain name

        Master in System and Network Engineering Analysis of DNS Resolver Performance Measurements Supervisors: Yuri Schaeffer

        Add to Reading List

        Source URL: www.nlnetlabs.nl

        Language: English - Date: 2015-08-24 06:37:35
        588

        Published in ACM Operating Systems Review 32(4):33–39, ID-based Secret-Key Cryptography? Marc Joye and Sung-Ming Yen Laboratory of Cryptography and Information Security Dept of Electrical Engineering, Tamkang Un

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:44:06
          589

          Achieving Full Security in Privacy-Preserving Data Mining Marina Blanton Department of Computer Science and Engineering University of Notre Dame

          Add to Reading List

          Source URL: www.cse.nd.edu

          Language: English - Date: 2011-09-01 18:38:53
            590Political philosophy / Internet / Politics / Working groups / Internet Engineering Task Force / Open Vulnerability and Assessment Language / Consensus decision-making / Center for Internet Security

            OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Kent Landfield – Intel Corporation Randy Taylor – ThreatGuard, Inc.

            Add to Reading List

            Source URL: oval.mitre.org

            Language: English - Date: 2015-07-09 13:27:01
            UPDATE