Computer security

Results: 47159



#Item
91A birthday present every eleven wallets? The security of customer-chosen banking PINs Joseph Bonneau, S¨oren Preibusch, Ross Anderson Computer Laboratory University of Cambridge {jcb82,sdp36,rja14}@cl.cam.ac.uk

A birthday present every eleven wallets? The security of customer-chosen banking PINs Joseph Bonneau, S¨oren Preibusch, Ross Anderson Computer Laboratory University of Cambridge {jcb82,sdp36,rja14}@cl.cam.ac.uk

Add to Reading List

Source URL: preibusch.de

Language: English - Date: 2012-03-06 07:30:26
    92CALL FOR PAPERS  (STAST3rd International Workshop on Socio-Technical Aspects in Security and Trust http://www.stast2013.uni.lu Co-located with 2013 IEEE 26th Computer Security Foundation Symposium

    CALL FOR PAPERS (STAST3rd International Workshop on Socio-Technical Aspects in Security and Trust http://www.stast2013.uni.lu Co-located with 2013 IEEE 26th Computer Security Foundation Symposium

    Add to Reading List

    Source URL: stast2013.uni.lu

    Language: English - Date: 2013-04-13 18:55:47
      93Science of Security Meeting, Berkeley CA, 17, 18 Nov 2008  Security and Composition John Rushby  Computer Science Laboratory

      Science of Security Meeting, Berkeley CA, 17, 18 Nov 2008 Security and Composition John Rushby Computer Science Laboratory

      Add to Reading List

      Source URL: sos.cs.virginia.edu

      Language: English - Date: 2008-11-19 23:30:14
        94Proceedings on Privacy Enhancing Technologies ; ):1–18  Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism

        Proceedings on Privacy Enhancing Technologies ; ):1–18 Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism

        Add to Reading List

        Source URL: www.franziroesner.com

        Language: English - Date: 2016-06-02 16:32:37
          95CS461/ECE422 Computer Security I November 11, 2015 Project 5: Forensics

          CS461/ECE422 Computer Security I November 11, 2015 Project 5: Forensics

          Add to Reading List

          Source URL: courses.engr.illinois.edu

          Language: English - Date: 2015-12-04 12:59:10
            96Cutoff Bounds for Consensus Algorithms Ognjen Marić, Christoph Sprenger, and David Basin Institute of Information Security Department of Computer Science, ETH Zurich  Abstract. Consensus algorithms are fundamental build

            Cutoff Bounds for Consensus Algorithms Ognjen Marić, Christoph Sprenger, and David Basin Institute of Information Security Department of Computer Science, ETH Zurich Abstract. Consensus algorithms are fundamental build

            Add to Reading List

            Source URL: people.inf.ethz.ch

            Language: English - Date: 2017-09-15 08:25:25
              97Evaluating Automated Facial Age Estimation Techniques for Digital Forensics Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon Forensics and Security Research Group School of Computer Science University College Dub

              Evaluating Automated Facial Age Estimation Techniques for Digital Forensics Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon Forensics and Security Research Group School of Computer Science University College Dub

              Add to Reading List

              Source URL: forensicsandsecurity.com

              Language: English - Date: 2018-03-29 07:05:28
                98Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 1 February 4, 2014

                Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 1 February 4, 2014

                Add to Reading List

                Source URL: courses.csail.mit.edu

                Language: English
                  99REGISTRATION DOCUMENT  SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

                  REGISTRATION DOCUMENT SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

                  Add to Reading List

                  Source URL: www.youthfund.go.ke

                  Language: English - Date: 2017-05-24 13:41:29
                    1002016 IEEE 29th Computer Security Foundations Symposium  Correlated Secrets in Quantitative Information Flow Nicol´as E. Bordenabe  Geoffrey Smith

                    2016 IEEE 29th Computer Security Foundations Symposium Correlated Secrets in Quantitative Information Flow Nicol´as E. Bordenabe Geoffrey Smith

                    Add to Reading List

                    Source URL: users.cis.fiu.edu

                    Language: English - Date: 2017-08-28 12:01:04