Security

Results: 374843



#Item
241Finance / Economy / Money / Financial markets / Futures contract / Futures exchange / Hedge / Short / Single-stock futures / Option / Margin / Day trading

Risk Disclosure Statement for Security Futures Contracts

Add to Reading List

Source URL: www.traditionamericas.com

Language: English - Date: 2017-03-27 10:20:10
242Programming language implementation / Software / Computer programming / Compiler construction / Compiler optimizations / Compilers / Register allocation / Instruction set architectures / LLVM / Optimizing compiler / Static single assignment form / GNU Compiler Collection

Instruction Scheduling and Register Allocation on ARM Cortex-M Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:40:08
243

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    244Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

    Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

    Add to Reading List

    Source URL: dominictarr.github.io

    Language: English - Date: 2015-07-10 14:55:46
    245Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

    Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:26
    246Algebra / Mathematics / Abstract algebra / Algebraic geometry / Commutative algebra / Asymptotic analysis / Mathematical series / Grbner basis / Invariant theory / Generating function / Big O notation / Hilbert series and Hilbert polynomial

    LNCSOn Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-03-20 04:03:40
    247Economy / Employment classifications / Social programs / Types of insurance / Labour law / Economic integration / European Single Market / Health insurance / Federal Insurance Contributions Act tax / Unemployment benefits / Insurance / Temporary work

    Federal Department of Home Affairs DFI Federal Social Insurance Office FSIO International Affairs Social Security for Posted Workers

    Add to Reading List

    Source URL: www.bsv.admin.ch

    Language: English
    248Cryptocurrencies / Alternative currencies / Economy / Money / Exonumia / Bitcoin / Digital currencies / Private currencies / Zerocoin protocol / Zcash / CoinJoin / Blockchain

    Zerocash: Decentralized Anonymous Payments from Bitcoin Eli Ben-Sasson∗ , Alessandro Chiesa† , Christina Garman‡ , Matthew Green‡ , Ian Miers‡ , Eran Tromer§ , Madars Virza† ∗ Technion, .

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-04-21 13:48:10
    249

    PDF Document

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    - Date: 2017-03-21 10:20:48
      250

      PDF Document

      Add to Reading List

      Source URL: www.ieee-security.org

      - Date: 2018-05-25 13:01:35
        UPDATE