搜索结果: 1-9 共查到“计算机科学技术其他学科 security”相关记录9条 . 查询时间(0.128 秒)
2017年第七届新兴安全技术国际会议(2017 Seventh International Conference on Emerging Security Technologies)
2017年 第七届 新兴安全技术 国际会议
2017/8/29
The Emerging Security Technologies (EST) Conference is a leading Euro-Asia technology forum dedicated to the presentation and discussion of new ideas and concepts in emerging technologies that span ap...
UW security researchers show that Google’s AI tool for video searching can be easily deceived
UW security researchers Google’s AI tool video searching easily deceived
2017/4/27
University of Washington researchers have shown that Google’s new tool that uses machine learning to automatically analyze and label video content can be deceived by inserting a photograph periodicall...
2017年第一届ACM加密安全与隐私国际会议(2017 International Conference on Cryptography,Security and Privacy)
2017年 第一届 ACM加密安全与隐私 国际会议
2017/1/10
Welcome to the official website of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP 2017, will be held during March 17-19, 2017, in Wuhan, China. ICCSP 2017, aims to bri...
Smartphone Security:Why Doodling Trumps Text Passwords
Smartphone Security Doodling Trumps Text Passwords
2016/3/21
Someday soon, you may be able to log into your smartphone with sweeping gestures or doodling, using one or more fingers.Rutgers University researchers have performed the first study of free-form gestu...
We live in times of constant technological progress in which new paradigms and technologies, such as the "Internet of Things", "Semantic Web" or "Cloud Computing" are constantly appearing and promisin...
Illinois CS Part of $30 Million Homeland Security Research Center
Illinois CS $30 Million Homeland Security Research Center
2010/1/13
The University of Illinois’ Department of Computer Science has been selected by Department of Homeland Security (DHS) to receive more than $5 M over the next 6 years as part of a Rutgers’ led DHS Cent...
Legal and Security Issues of Information and CommunicationTechnologies, and their applications, are of increasing importance forthe Information Society. As these issues become more and more complexthe...
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
3G Security 3G Security Structure 3G authentication and key agreement protocol Security arith- metic
2013/1/29
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...
The Analysis and Amendment of Security System in 3G
3G Security 3G Security Structure 3G authentication and key agreement protocol Security arith- metic
2013/1/29
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...