Computer security

Results: 47159



#Item
41Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham  Security of cloud computing

Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2011-06-20 08:16:21
    42Ethics  Building an Active Computer Security Ethics Community  In spite of significant ethical challenges faced by

    Ethics Building an Active Computer Security Ethics Community In spite of significant ethical challenges faced by

    Add to Reading List

    Source URL: nsrg.ece.illinois.edu

    Language: English - Date: 2018-06-11 12:51:20
      43IMPROVING SOFTWARE SECURITY WITH PRECISE STATIC AND RUNTIME ANALYSIS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

      IMPROVING SOFTWARE SECURITY WITH PRECISE STATIC AND RUNTIME ANALYSIS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2017-01-10 09:15:12
        44Subversion: The Neglected Aspect of Computer Security

        Subversion: The Neglected Aspect of Computer Security

        Add to Reading List

        Source URL: seclab.cs.ucdavis.edu

        - Date: 2006-01-16 10:12:53
          45Journal of Computer Security IOS Press draft printout, (17 Sep 2009), 1–20  1

          Journal of Computer Security IOS Press draft printout, (17 Sep 2009), 1–20 1

          Add to Reading List

          Source URL: users.cis.fiu.edu

          Language: English - Date: 2009-09-17 08:17:02
            462013 IEEE Symposium on Security and Privacy  SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements Jeremy Clark and Paul C. van Oorschot School of Computer Science

            2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements Jeremy Clark and Paul C. van Oorschot School of Computer Science

            Add to Reading List

            Source URL: oaklandsok.github.io

            Language: English - Date: 2018-03-14 15:33:55
              47Teaching Computer Security Matt Bishop Department of Mathematics and Computer Science, Dartmouth College, 6188 Bradley Hall, Hanover, NHAbstract This paper describes three courses in computer security, and of

              Teaching Computer Security Matt Bishop Department of Mathematics and Computer Science, Dartmouth College, 6188 Bradley Hall, Hanover, NHAbstract This paper describes three courses in computer security, and of

              Add to Reading List

              Source URL: seclab.cs.ucdavis.edu

              Language: English - Date: 2006-01-16 10:12:36
                48Computer Security Threat Monitoring and Surveillance

                Computer Security Threat Monitoring and Surveillance

                Add to Reading List

                Source URL: seclab.cs.ucdavis.edu

                - Date: 2006-01-16 10:12:37
                  49Managing Computer Security Incident Response Teams (CSIRTs)  “Can you business survive and recover from network attacks and intruder threats?”

                  Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

                  Add to Reading List

                  Source URL: www.pre-secure.com

                  Language: English - Date: 2002-11-01 16:30:46