Hakutulokset: Hakutulos
yhteensä 13 hakutulosta
Hardware Platform Security for Mobile Devices
Personal mobile devices like smartphones and tablets are ubiquitous. People use mobile devices for fun, for work, and for organizing and managing their lives, including their …
The Security & Privacy Acceptance Framework (SPAF)
Cybersecurity and Privacy (S&P) unlock the full potential of computing. Use of encryption, authentication, and access control, for example, allows employees to correspond with …
Decentralized Finance
Financial markets are undergoing an unprecedented transformation. Technological advances have brought major improvements to the operations of financial services. While these …
Expressing Information Flow Properties
With information comes responsibility: a responsibility to use information according to appropriate restrictions. Forced by regulations and public sentiment, technology companies …
Accountability in Computing
Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control mechanisms, are preventive in nature. That is, they stop unauthorized …
Identifying and Mitigating the Security Risks of Generative AI
Every major technical invention resurfaces the dual-use dilemma -- the new technology has the potential to be used for good as well as for harm. Generative AI (GenAI) techniques, …
Proofs, Arguments, and Zero-Knowledge
This monograph is about verifiable computing (VC). VC refers to cryptographic protocols called interactive proofs (IPs) and arguments that enable a prover to provide a guarantee to …
Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks
This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversarial machine learning. It delves into the intricacies of …
A Pragmatic Introduction to Secure Multi-Party Computation
Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale …
Assured Autonomy Survey
Autonomous systems will soon be ubiquitous in our society, saving us time, performing tasks we do not want to do, caring for us and keeping us safe. Autonomous robots in homes and …
Cybersecurity for Modern Smart Grid Against Emerging Threats
Smart Grid is a power grid system that uses digital communication technologies. By deploying intelligent devices throughout the power grid infrastructure, from power generation to …
Cloud Computing Security
Cloud services have revolutionized computing in the modern world. In an increasingly networked ecosystem, it is commonplace for enterprises and private parties alike to leverage …