Security

Results: 374843



#Item
101Towards Evaluating the Robustness of Neural Networks Nicholas Carlini David Wagner University of California, Berkeley A BSTRACT

Towards Evaluating the Robustness of Neural Networks Nicholas Carlini David Wagner University of California, Berkeley A BSTRACT

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:30
102Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2   1

Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2 1

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-08-11 12:57:48
103Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Add to Reading List

Source URL: dominictarr.github.io

Language: English - Date: 2015-07-10 14:55:46
104Dr.-Ing. Mario Heiderich, Cure53 Bielefelder Str. 14 DBerlin cure53.de ·   TunnelBear Security Assessment Summary

Dr.-Ing. Mario Heiderich, Cure53 Bielefelder Str. 14 DBerlin cure53.de · TunnelBear Security Assessment Summary

Add to Reading List

Source URL: cure53.de

Language: English - Date: 2018-10-23 04:41:04
105NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64 Yaohui Chen∗ Ahmed M. Azab† ∗

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64 Yaohui Chen∗ Ahmed M. Azab† ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:59:04
106From trash to treasure: timing-sensitive garbage collection Mathias V. Pedersen Aslan Askarov

From trash to treasure: timing-sensitive garbage collection Mathias V. Pedersen Aslan Askarov

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:11
107On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:54:32
108Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2  Institute of Information Engineering, Chinese Academy of Sciences

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
109Federal Department of Home Affairs Federal Social Insurance Office International Affairs Division OVERVIEW OF SWISS SOCIAL SECURITY

Federal Department of Home Affairs Federal Social Insurance Office International Affairs Division OVERVIEW OF SWISS SOCIAL SECURITY

Add to Reading List

Source URL: www.bsv.admin.ch

Language: English