1![Peerio Technologies Security Design (June 20, 2017)
I. Overview Peerio is an application that allows users to store and exchange end-to-end encrypted information in the Peerio Technologies Security Design (June 20, 2017)
I. Overview Peerio is an application that allows users to store and exchange end-to-end encrypted information in the](https://www.pdfsearch.io/img/5d5af92355a4fab011a1a7f80a8d0e9a.jpg) | Add to Reading ListSource URL: s3.amazonaws.comLanguage: English - Date: 2018-07-11 15:11:09
|
---|
2![Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 G´ abor Lencsea,∗, Youki Kadobayashib a Department Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 G´ abor Lencsea,∗, Youki Kadobayashib a Department](https://www.pdfsearch.io/img/4ebf4c6cb3707d2349663bd4dcec1918.jpg) | Add to Reading ListSource URL: www.hit.bme.huLanguage: English - Date: 2018-04-20 08:10:01
|
---|
3![Proceedings on Privacy Enhancing Technologies ; ):95–112 Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the Proceedings on Privacy Enhancing Technologies ; ):95–112 Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the](https://www.pdfsearch.io/img/e6fde73cafec0dd420d5f33fbd1151ab.jpg) | Add to Reading ListSource URL: petsymposium.orgLanguage: English - Date: 2017-10-04 16:18:51
|
---|
4![Working Paper - Update on Privacy and Security Issues in Internet Telephony (VoIP) and related Communication Technologies (commented OPC) Working Paper - Update on Privacy and Security Issues in Internet Telephony (VoIP) and related Communication Technologies (commented OPC)](https://www.pdfsearch.io/img/0561b81a6a56b39237d6192b3891597c.jpg) | Add to Reading ListSource URL: www.datenschutz-berlin.deLanguage: English - Date: 2017-09-11 03:35:24
|
---|
5![TRUSTED, VERIFIED AND MORE SECURE ® All .BANK domain names must meet robust security technologies TRUSTED, VERIFIED AND MORE SECURE ® All .BANK domain names must meet robust security technologies](https://www.pdfsearch.io/img/15f178a5e3d24d789ef288a191c6d201.jpg) | Add to Reading ListSource URL: www.register.bankLanguage: English - Date: 2017-01-19 10:40:46
|
---|
6![Survey of IPv6 Transition Technologies for Security Analysis Gábor LENCSE†,‡, and Youki KADOBAYASHI† †Laboratory for Cyber Resilience, Nara Institute of Science and TechnologyTakayama, Ikoma, Nara, 630-0 Survey of IPv6 Transition Technologies for Security Analysis Gábor LENCSE†,‡, and Youki KADOBAYASHI† †Laboratory for Cyber Resilience, Nara Institute of Science and TechnologyTakayama, Ikoma, Nara, 630-0](https://www.pdfsearch.io/img/9351d1c9c0d156219afd8da45ed5c3cf.jpg) | Add to Reading ListSource URL: www.hit.bme.huLanguage: English - Date: 2017-07-18 08:01:06
|
---|
7![INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of life of citizens and transformed the way that INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of life of citizens and transformed the way that](https://www.pdfsearch.io/img/730d6d64bb2fea921fef6979930619ca.jpg) | Add to Reading ListSource URL: www.cert.gov.lkLanguage: English - Date: 2018-04-17 05:12:00
|
---|
8![Proceedings on Privacy Enhancing Technologies ; ):1–18 Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism Proceedings on Privacy Enhancing Technologies ; ):1–18 Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism](https://www.pdfsearch.io/img/259d52e4af8e39fcac001dc3213ccd58.jpg) | Add to Reading ListSource URL: www.franziroesner.comLanguage: English - Date: 2016-06-02 16:32:37
|
---|
9![Advanced Research and Technology SymposiumJoin a community of academics, students, and entrepreneurs. Hear about groundbreaking new technologies that are being brought to bear to address national security challeng Advanced Research and Technology SymposiumJoin a community of academics, students, and entrepreneurs. Hear about groundbreaking new technologies that are being brought to bear to address national security challeng](https://www.pdfsearch.io/img/7e7685e04a7c1259efd52be623da6501.jpg) | Add to Reading ListSource URL: conferences.ll.mit.eduLanguage: English - Date: 2018-04-30 10:19:12
|
---|
10![Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i](https://www.pdfsearch.io/img/d37e96fab89c2f2f3ca76e0eaaa2b625.jpg) | Add to Reading ListSource URL: travellingcryptographer.com- Date: 2017-10-03 15:50:40
|
---|