Results 191 to 200 of about 103,009 (233)
Some of the next articles are maybe not open access.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Mobile devices are evolving as the dominant computing platform and consequently application repositories and app markets are becoming the prevalent paradigm for deploying software. Due to their central and trusted position in the software ecosystem, coerced, hacked or malicious app markets pose a serious threat to user security.
Sascha Fahl +5 more
openaire +1 more source
Mobile devices are evolving as the dominant computing platform and consequently application repositories and app markets are becoming the prevalent paradigm for deploying software. Due to their central and trusted position in the software ecosystem, coerced, hacked or malicious app markets pose a serious threat to user security.
Sascha Fahl +5 more
openaire +1 more source
IEEE Spectrum, 2016
Today, silicon microchips underlie every aspect of digital computing. But their dominance was never a foregone conclusion. Throughout the 1950s, electrical engineers and other researchers explored many alternatives to making digital computers. One of them seized the imagination of the U.S. National Security Agency (NSA): a superconducting supercomputer.
openaire +1 more source
Today, silicon microchips underlie every aspect of digital computing. But their dominance was never a foregone conclusion. Throughout the 1950s, electrical engineers and other researchers explored many alternatives to making digital computers. One of them seized the imagination of the U.S. National Security Agency (NSA): a superconducting supercomputer.
openaire +1 more source
2007
Communication via electronic systems such as telephones, faxes, e-mail, computers, etc., has enormously increased the volume and ease with which people and institutions can exchange messages and information. However, the associated technologies have also enabled the introduction of new sophisticated concepts and methods in interception and analysis for
openaire +1 more source
Communication via electronic systems such as telephones, faxes, e-mail, computers, etc., has enormously increased the volume and ease with which people and institutions can exchange messages and information. However, the associated technologies have also enabled the introduction of new sophisticated concepts and methods in interception and analysis for
openaire +1 more source
2016
La couv.porte en plus : "l'histoire de la plus secrete des agences de renseignement". En appendice, choix de documents. Bibliogr. p. 465-466. Webliogr. p. 467. Glossaire. Index Organisee en seize agences, la NSA est un organisme charge d'intercepter les renseignements electroniques dans le monde entier en vue notamment de lutter contre le terrorisme. L'
openaire +1 more source
La couv.porte en plus : "l'histoire de la plus secrete des agences de renseignement". En appendice, choix de documents. Bibliogr. p. 465-466. Webliogr. p. 467. Glossaire. Index Organisee en seize agences, la NSA est un organisme charge d'intercepter les renseignements electroniques dans le monde entier en vue notamment de lutter contre le terrorisme. L'
openaire +1 more source
Communications of the ACM, 2014
How good security at the NSA could have stopped him.
openaire +1 more source
How good security at the NSA could have stopped him.
openaire +1 more source

