Beyond Security

Results: 583



#Item
21BUGYO_Beyond-leaflet-start.pub

BUGYO_Beyond-leaflet-start.pub

Add to Reading List

Source URL: projects.celtic-initiative.org

Language: English - Date: 2009-06-19 12:31:10
221  Auditing Distributed Databases A new paradigm is among us beyond the “Cloud” or mobile devices, and that is with the use of Distributed Database Systems (DDS). Though they have been around for the better part of a

1 Auditing Distributed Databases A new paradigm is among us beyond the “Cloud” or mobile devices, and that is with the use of Distributed Database Systems (DDS). Though they have been around for the better part of a

Add to Reading List

Source URL: cloudsecurityalliance.org

Language: English - Date: 2015-04-27 14:00:07
23Beyond Testing: What Really Matters Andreas Marx CEO, AV-TEST GmbH Virus Bulletin Conference 2013, Berlin, Germany – 02nd October 2013

Beyond Testing: What Really Matters Andreas Marx CEO, AV-TEST GmbH Virus Bulletin Conference 2013, Berlin, Germany – 02nd October 2013

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2015-09-21 03:25:31
24Assets Keys to Prosperity Ruth Meinzen-Dick Senior Research Fellow, International Food Policy Research Institute (IFPRI), Washington, DC USA For lasting prosperity, it is important to think beyond increasing income, to b

Assets Keys to Prosperity Ruth Meinzen-Dick Senior Research Fellow, International Food Policy Research Institute (IFPRI), Washington, DC USA For lasting prosperity, it is important to think beyond increasing income, to b

Add to Reading List

Source URL: www.scienceforum2016.org

Language: English - Date: 2016-04-05 05:18:51
25On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2010-12-10 03:09:04
26Beyond Text Performances, Sounds, Images, Objects Beyond Text Before and After Professor Evelyn Welch

Beyond Text Performances, Sounds, Images, Objects Beyond Text Before and After Professor Evelyn Welch

Add to Reading List

Source URL: www.beyondtext.ac.uk

Language: English - Date: 2012-04-18 04:41:09
27On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2005-06-19 20:47:33
28Agroecology and Climate Justice: A People’s Guide to Paris and Beyond Climate change, industrial agribusiness, and hunger – breaking the chain Industrial food production is a lose-lose option for the world’s

Agroecology and Climate Justice: A People’s Guide to Paris and Beyond Climate change, industrial agribusiness, and hunger – breaking the chain Industrial food production is a lose-lose option for the world’s

Add to Reading List

Source URL: www.criticalcollective.org

Language: English - Date: 2015-12-04 13:08:12
29Speaker Excellence Awards – 2015 Annual Meeting and Exposition Gold Medal Sessions Aaron Bartell • Node.js: Building Your First App with Express.js Wayne Bowers • Beyond SSL: IBM i OS Transport Security

Speaker Excellence Awards – 2015 Annual Meeting and Exposition Gold Medal Sessions Aaron Bartell • Node.js: Building Your First App with Express.js Wayne Bowers • Beyond SSL: IBM i OS Transport Security

Add to Reading List

Source URL: www.common.org

Language: English - Date: 2016-07-26 12:30:37
30Preprint of paper to appear at WIFS2010  BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51