Eleventh Smart Card Research and Advanced Application Conference – Cardis 2012
CARDIS 2012 – Call for Papers —————————– Eleventh Smart Card Research and Advanced Application Conference Since 1994, CARDIS is the foremost international conference dedicated to smart card research...
View Article3rd International Conference on Cloud Computing and Services Science
CALL FOR PAPERS 3rd International Conference on Cloud Computing and Services Science CLOSER website: http://closer.scitevents.org May 8 – 10, 2013 Aachen, Germany Co-organized by: RWTH Sponsored by:...
View ArticleASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications...
ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security Link: http://hise.hznu.edu.cn/asiaccs/ When May 8, 2013 – May 10, 2013 Where Hangzhou, China Submission Deadline...
View ArticleSecurity and Privacy in Healthcare IT – 26th International Symposium on...
Security and Privacy in Healthcare IT Special track in The 26th International Symposium on Computer-Based Medical System; June 20-22, Porto, Portugal. Paper submission January 31, 2013 Notification of...
View Article3rd International Conference on Cloud Computing and Services Science
CALL FOR POSITION PAPERS 3rd International Conference on Cloud Computing and Services Science CLOSER website: http://closer.scitevents.org May 8 – 10, 2013 Aachen, Germany Technically sponsored by:...
View Article34th WIC Symposium on Information Theory in the Benelux
34th WIC Symposium on Information Theory in the Benelux Third joint WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux May 30-31, 2013, imec, Leuven, Belgium, organized...
View ArticleInternational Symposium on Engineering Secure Software and Systems (ESSoS)
International Symposium on Engineering Secure Software and Systems (ESSoS) February 27 – March 1, 2013 Paris, France In cooperation with: ACM SIGSAC and SIGSOFT and IEEE CS (TCSE). Trustworthy, secure...
View Article10th International Conference on Security and Cryptography (SECRYPT 2013)
10th International Conference on Security and Cryptography (SECRYPT 2013) Reykjavik, Iceland, July 29-31, 2013 http://secrypt.icete.org In Cooperation with: ACM SIGSAC Co-organized by: RU – Reykjavik...
View ArticleThe 2013 International Conference on Security and Management – SAM’13
CALL FOR PAPERS Paper Submission Deadline: March 18, 2013 The 2013 International Conference on Security and Management SAM’13 July 22-25, 2013, Las Vegas, USA http://sam.udmercy.edu/sam13/ You are...
View ArticleThe Seventh International Conference on Mobile Ubiquitous Computing, Systems,...
============== UBICOMM 2013 | Call for Papers =============== CALL FOR PAPERS, TUTORIALS, PANELS UBICOMM 2013, The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and...
View ArticleSerious security holes fixed in Opera – but Mac App Store users left at risk...
Serious security holes fixed in Opera – but Mac App Store users left at risk again | Naked Security.
View ArticleSecurity and Privacy in Healthcare IT Special track in The 26th International...
Dear all, the paper submission deadline of CBMS 2013 was extended along with its special tracks. Therefore the new deadline for paper submission of SPH2013 (a special track of the CBMS 2013) was also...
View ArticleThe 2013 World Congress in Computer Science, Computer Engineering, and...
CALL FOR PAPERS Paper Submission Deadline: March 18, 2013 The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing July 22-25, 2013, Las Vegas, USA WORLDCOMP’13...
View ArticleSyndie
Syndie is an open source system for operating distributed forums (Why would you use Syndie?), offering a secure and consistent interface to various anonymous and non-anonymous content networks. via...
View ArticleIs DEF CON right to ask the feds to stay away? [POLL] | Naked Security
The founder of the DEF CON hacker conference has announced that members of the U.S. federal government will not be welcome to attend this year’s event. DEF CON is one of the world’s largest hacker...
View ArticleSeminar: Naim Qachri “Presentation of the Galois/Counter Mode of Operation...
March 18, 2014 – 12.45 – Computer Department Seminar Room – NO Building, 8th floor (2N8.202) Speaker : Naim Qachri (ULB) Title : Presentation of the Galois/Counter Mode of Operation (GCM)
View ArticleSecure webmail service Lavabit suspends operation, citing legal issues |...
Secure webmail service Lavabit suspends operation, citing legal issues | Naked Security.
View ArticleTop 10 Secure Coding Practices – Secure Coding – CERT Secure Coding Standards
Top 10 Secure Coding Practices Validate input. Validate input from all untrusted data sources. Proper input validation can eliminate the vast majority of software vulnerabilities. Be suspicious of most...
View ArticleGostCrypt
The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project. Snowden’s leaks have made clear more than ever that the massive use of encryption by citizens must...
View Article
More Pages to Explore .....