Datorsäkerhet
Filter
Every major technical invention resurfaces the dual-use dilemma -- the new technology has the potential to be used for good as well as for harm. Generative AI (GenAI) techniques, …
Cybersecurity and Privacy (S&P) unlock the full potential of computing. Use of encryption, authentication, and access control, for example, allows employees to correspond with …
Financial markets are undergoing an unprecedented transformation. Technological advances have brought major improvements to the operations of financial services. While these …
With information comes responsibility: a responsibility to use information according to appropriate restrictions. Forced by regulations and public sentiment, technology companies …
Personal mobile devices like smartphones and tablets are ubiquitous. People use mobile devices for fun, for work, and for organizing and managing their lives, including their …
Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control mechanisms, are preventive in nature. That is, they stop unauthorized …
This monograph is about verifiable computing (VC). VC refers to cryptographic protocols called interactive proofs (IPs) and arguments that enable a prover to provide a guarantee to …
This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversarial machine learning. It delves into the intricacies of …
Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale …
Autonomous systems will soon be ubiquitous in our society, saving us time, performing tasks we do not want to do, caring for us and keeping us safe. Autonomous robots in homes and …