Lablet Quarterly Meeting at NCSU, Feb 2–3, 2016 |
|
Science of Security (SoS) Newsletter (2016 - Issue 3) |
|
Science of Security (SoS) Newsletter (2016 - Issue 4) |
|
Science of Security (SoS) Newsletter (2016 - Issue 5) |
|
Science of Security Annual Report 2015 |
|
Hard Problems: Predictive Metrics 2015 |
|
Hard Problems: Resilient Security Architectures 2015 |
|
Hard Problems: Policy-based Security Governance 2015 |
|
Hard Problems: Scalability and Composability 2015 |
|
Hash Algorithms 2015 |
|
Intellectual Property Protection 2015 |
|
Identity Management 2015 |
|
Elliptic Curve Cryptography 2015 |
|
Data Sanitization 2015 |
|
Data in Motion and Data at Rest 2015 |
|
Integrity of Outsourced Databases 2015 |
|
Immersive Systems 2015 |
|
Acoustic Fingerprints 2015 |
|
Compiler Security 2015 |
|
Cross Layer Security 2015 |
|
Information Theoretic Security 2015 |
|
Automated Response Actions 2015 |
|
Quick Response (QR) Code 2015 |
|
International Security Related Conferences |
|
Composability 2015 |
|