Semantic security

Results: 252



#Item
121Reverse engineering / Floating point / Computing / Engineering / Technology / Software bug / Abstract interpretation

Overview of C and Binary Analyzers Kestrel Technology specializes in sound semantic static analysis with applications in software security, reliability, and robustness. Our core technology is abstract interpretation, imp

Add to Reading List

Source URL: www.kestreltechnology.com

Language: English - Date: 2014-10-02 17:55:54
122Cognitive architecture / Cognition / Semantic Web / Information science / Technical communication / ACT-R / Cognitive model / Cognitive science / Formal ontology / Science / Artificial intelligence / Ontology

General Requirements of a Hybrid-Modeling Framework for Cyber Security Alessandro Oltramari, Noam Ben-Asher, Lorrie Cranor, Lujo Bauer, Nicolas Christin Carnegie Mellon University Pittsburgh, USA

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2015-02-10 10:17:24
123Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-01 19:29:53
124Identifiers / Universal identifiers / Data modeling / Linked data / Semantic Web / World Wide Web / Globally unique identifier / Linkage / Unique key / Software engineering / Computing / Information

Data Linking Deterministic linking and linkage keys The simplest form of deterministic linking uses a unique identifier, such as an Australian Business Number or a social security number, to determine if the records refe

Add to Reading List

Source URL: www.nss.gov.au

Language: English - Date: 2014-07-17 21:43:55
125Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Diffie–Hellman key exchange / Semantic security / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia2,1 , Stanislaw Jarecki1, and Gene Tsudik1 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
126Malleability / Adaptive chosen-ciphertext attack / Semantic security / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Optimal asymmetric encryption padding / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-02 18:28:55
127Authenticated encryption / Chosen-ciphertext attack / RSA / Semantic security / Advantage / Crypt / Cryptography / Deterministic encryption / Ciphertext

DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-02 21:51:23
128Simple public key infrastructure / Computing / Computer security / Cyberwarfare / Authorization certificate / Public key infrastructure / DAML-S / Public key certificate / Semantic Web Services / Key management / Web services / Public-key cryptography

Credential Based Access Control for Semantic Web Services

Add to Reading List

Source URL: aaai.org

Language: English - Date: 2006-01-11 06:40:46
129United States Department of Justice / ISO/IEC 11179 / Metadata registry / National Information Exchange Model / Open data / Interoperability / Linked data / Internet privacy / Government procurement in the United States / Information / Data / United States Department of Homeland Security

Research on US Federal Government Handling of Data Dr. Brand Niemann Director and Senior Enterprise Architect – Data Scientist Semantic Community http://semanticommunity.info/

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2013-01-21 03:24:19
130Semantic Web / Information / Web services / Market data / Data / Metadata

First Derivatives acquires US-based Reference Data Management Solutions Company Deal extends company’s footprint in capital markets to financial data management, reference data and security master space First Derivativ

Add to Reading List

Source URL: www.firstderivatives.com

Language: English - Date: 2011-04-26 12:55:14
UPDATE