Security

Results: 374843



#Item
81High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
82Model Checking Multiagent Systems  MAS for Security Multiagent System-based Verification of Security and Privacy

Model Checking Multiagent Systems MAS for Security Multiagent System-based Verification of Security and Privacy

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:29:18
83Federal Register / Vol. 66, NoMonday, March 12, Notices institution. The respondents are Social Security beneficiaries who use the Internet to enroll in DD/EFT. Number of Respondents: 3,485. Frequency of Re

Federal Register / Vol. 66, NoMonday, March 12, Notices institution. The respondents are Social Security beneficiaries who use the Internet to enroll in DD/EFT. Number of Respondents: 3,485. Frequency of Re

Add to Reading List

Source URL: 34.232.160.87

Language: English - Date: 2017-07-06 11:25:58
84Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
85Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking  University ‡ CNCERT/CC

Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-27 07:43:28
86SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security Hamed Haddadi∗ , Vassilis Christophides† , Renata Teixeira† , Kenjiro Cho‡ , Shigeya Suzuki§ , Adrian Perrig¶ ∗ Imperial  College London

SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security Hamed Haddadi∗ , Vassilis Christophides† , Renata Teixeira† , Kenjiro Cho‡ , Shigeya Suzuki§ , Adrian Perrig¶ ∗ Imperial College London

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
    87All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands ,

    All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands ,

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-02-09 07:40:08
    88Detection of Security Vulnerabilities in C Code using Runtime Verification: an Experience Report Kostyantyn Vorobyov, Nikolai Kosmatov, and Julien Signoles CEA, LIST, Software Reliability and Security Laboratory, PC 174,

    Detection of Security Vulnerabilities in C Code using Runtime Verification: an Experience Report Kostyantyn Vorobyov, Nikolai Kosmatov, and Julien Signoles CEA, LIST, Software Reliability and Security Laboratory, PC 174,

    Add to Reading List

    Source URL: julien.signoles.free.fr

    Language: English - Date: 2018-06-20 05:46:32
    89Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1  Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

    Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 06:46:30
    90Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2

    Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-03-09 10:10:48