Security paper

Results: 6621



#Item
251

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:05:07
    252

    TECHNICAL WHITE PAPER Remote Exploitation of an Unaltered Passenger Vehicle Chris Valasek, Director of Vehicle Security Research for IOActive

    Add to Reading List

    Source URL: www.ioactive.com

    Language: English
      253

      This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustAn Internet-Wide View of Internet-Wide Scanning Zakir Durumeric University of Michigan

      Add to Reading List

      Source URL: web.engr.illinois.edu

      Language: English - Date: 2014-08-25 17:38:38
        254

        SeptemberWhite Paper INVISIBLE END-TO-END WEB SECURITY

        Add to Reading List

        Source URL: codesealer.com

        Language: English - Date: 2016-03-10 07:25:36
          255Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

          WhatsApp Encryption Overview Technical white paper April 4, 2016

          Add to Reading List

          Source URL: www.whatsapp.com

          Language: English
          256Computer security / Computer access control / Security / Prevention / Authentication / Multi-factor authentication / Identity theft / Money laundering / Security token / Information security / Internet security / Identity management

          Complying with rules for identity management An Economist Intelligence Unit briefing paper sponsored by IdenTrust

          Add to Reading List

          Source URL: www.identrust.com

          Language: English - Date: 2012-07-10 20:41:42
          257Computer access control / E-commerce / Supply chain management / Distribution / Computer network security / Authentication / Multi-factor authentication / Supply chain / Identity theft / Biometrics / Smart card / Security token

          The global supply chain Challenges for small and midsize enterprises An Economist Intelligence Unit briefing paper sponsored by IdenTrust

          Add to Reading List

          Source URL: www.identrust.com

          Language: English - Date: 2012-07-10 20:41:42
          258Technology / Computing / Videotelephony / Security engineering / Ambient intelligence / Internet of things / Cisco Systems / Machine to machine / Computer security / Cisco Jasper / Mobiliya

          White Paper The Internet of Things How the Next Evolution of the Internet Is Changing Everything

          Add to Reading List

          Source URL: www.cisco.com

          Language: English
          259E-commerce / Cybercrime / Cyberwarfare / Computer network security / Computer security / Cryptography / Consumer privacy / Internet privacy / Privacy / Cyber-security regulation / New Jersey Cybersecurity and Communications Integration Cell

          White Paper: Clearing the Red Tape Ensnaring Cybersecurity Collaboration

          Add to Reading List

          Source URL: internetidentity.com

          Language: English - Date: 2014-07-11 18:43:09
          260

          Security-Assessment.com White Paper Cross Context Scripting with Firefox Prepared by: Roberto Suggi Liverani

          Add to Reading List

          Source URL: www.security-assessment.com

          Language: English - Date: 2010-04-20 21:02:34
            UPDATE