Researchers at FIU’s College of Engineering and Computing have developed an encryption algorithm to defend videos from attackers with access to the world's most powerful computers. The encryption ...
Identifying anomalies in the operations of computer systems that control critical safety and security functions calls for extensive expertise, and the actions required need to be tested, analysed and ...
The IAEA recently issued its first implementing guide to comprehensively address computer security – Nuclear Security Series (NSS) No. 42-G Computer Security for Nuclear Security – to support experts ...
The US National Institute of Standards and Technology (NIST) has announced the phasing out of the secure hash algorithm (SHA)-1 in the federal government. The agency said it will stop using SHA-1 in ...
A team of computer scientists has come up with a dramatically faster algorithm for one of the oldest problems in computer science: maximum flow. The problem asks how much material can flow through a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results