Security

Results: 374843



#Item
231Computer architecture / Robotics / Computing / Industrial robot / Robot / Humanrobot interaction / Comau / Cobot / VxWorks / Robot software / Mobile robot

An Experimental Security Analysis of an Industrial Robot Controller Davide Quarta∗ , Marcello Pogliani∗ , Mario Polino∗ , Federico Maggi∗† , Andrea Maria Zanchettin∗ , and Stefano Zanero∗ ∗ Dipartimento

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:59
232Politics of the European Union / European Union / Politics of Europe / Foreign relations of the European Union / Common Security and Defence Policy / Common Foreign and Security Policy / Federica Mogherini / Coordinated Annual Review on Defence / Permanent Structured Cooperation / Military Planning and Conduct Capability / High Representative of the Union for Foreign Affairs and Security Policy / Military Mobility

Timeline: European cooperation in the area of security and defence We are seeing a historic moment in European defence.

Add to Reading List

Source URL: cdn4-eeas.fpfis.tech.ec.europa.eu

Language: English
233

Protecting Bare-metal Embedded Systems With Privilege Overlays Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗ Pur

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:27
    234Mathematical analysis / Mathematics / Post-quantum cryptography / Number theory / Measure theory / Cryptography / Algebra / Distribution / Support / Learning with errors / Weight / KullbackLeibler divergence

    Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-02-25 03:26:11
    235Gay-friendly / Industrial and organizational psychology / Regeneron Science Talent Search

    Crimes Reported to the Police and Campus Security AuthoritiesStatistics in the following table are based upon the definitions stated in the reauthorizations of the Higher Education Opportunity Act and Violen

    Add to Reading List

    Source URL: police.stanford.edu

    Language: English - Date: 2018-10-24 11:19:52
    236Prevention / Security / Computing / Safety / Information technology management / ISO/IEC 27001 / Computer security / Information governance / Information security / ISO/IEC 27006 / ISO/IEC 27001 Lead Auditor

    CERTIFICATE OF REGISTRATION Information Security Management System - ISO/IEC 27001:2013 The Certification Body of Schellman & Company, LLC hereby certifies that the following organization operates an Information Securit

    Add to Reading List

    Source URL: a.slack-edge.com

    Language: English - Date: 2018-06-26 14:09:55
    237Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

    Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

    Add to Reading List

    Source URL: www.ofirweisse.com

    Language: English - Date: 2018-10-17 09:19:20
    238Human behavior / Human sexuality / Violence / Sexual ethics / Sexual abuse / Sex crimes / Rape / Sexual violence / Campus sexual assault / Sexual harassment / Clery Act / Sexual assault

    Annual Security and Annual Fire Safety ReportAnnual Security and Annual Fire Safety Report 2018

    Add to Reading List

    Source URL: clery.emory.edu

    Language: English - Date: 2018-09-28 16:34:06
    239Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

    Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:35
    240Economy / Money / Finance / Financial services / European Economic Area / Social programs / European Free Trade Association / Types of insurance / Federal Insurance Contributions Act tax / Health insurance / Temporary work / Unemployment benefits

    Federal Department of Home Affairs FDHA Federal Social Insurance Office FSIO International Affairs Social Security for Posted Workers

    Add to Reading List

    Source URL: www.bsv.admin.ch

    Language: English
    UPDATE