Beyond Security

Results: 583



#Item
51

Institute for Cyber Security Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2014-10-28 12:49:58
    52

    White Paper A New Paradigm Shift: Comprehensive Security Beyond the Operating System

    Add to Reading List

    Source URL: mycourses.med.harvard.edu

    Language: English
      53

      Institute for Cyber Security Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2015-04-15 02:00:23
        54

        SYSTEMS SECURITY Editors: Patrick McDaniel, | Sean W. Smith, Beyond Planted Bugs in “Trusting Trust” The Input-Processing Frontier Sergey Bratus, Trey Darley, Michael Locasto

        Add to Reading List

        Source URL: www.cs.dartmouth.edu

        Language: English - Date: 2014-04-02 21:43:44
          55

          This paper was published in the Proceedings of the International Conference on Applied Cryptography and Information Security (ACIS) , 2006, pp. 327–337. Traceable Signature: Better Efficiency and Beyond⋆ He Ge1 and S

          Add to Reading List

          Source URL: nsl.cse.unt.edu

          Language: English - Date: 2012-01-12 18:49:58
            56

            Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 Universität Passau

            Add to Reading List

            Source URL: des.cse.nsysu.edu.tw

            Language: English - Date: 2014-12-07 09:37:30
              57

              This paper was published in the Proceedings of the International Conference on Applied Cryptography and Information Security (ACIS) , 2006, pp. 327–337. Traceable Signature: Better Efficiency and Beyond⋆ He Ge1 and S

              Add to Reading List

              Source URL: nsl.cse.unt.edu

              Language: English - Date: 2012-01-12 18:49:58
                58

                This paper was published in the Proceedings of the International Conference on Applied Cryptography and Information Security (ACIS) , 2006, pp. 327–337. Traceable Signature: Better Efficiency and Beyond⋆ He Ge1 and S

                Add to Reading List

                Source URL: www.uncg.edu

                Language: English - Date: 2009-10-01 23:36:57
                  59Software testing / Lint / Programming tool / Vulnerability

                  Beyond Patch and Pray: Security by Design • Adam Shostack • Presented to the Security Leadership Conference Series

                  Add to Reading List

                  Source URL: adam.shostack.org

                  Language: English - Date: 2014-06-11 11:47:33
                  60

                  A & A CUSTOM WOOD PRODUCTS A SPICE ABOVE ABLE ENERGY CO. ABOVE & BEYOND CONSTRUCTION ACCENTUAL LIGHTING ADT SECURITY SYSTEMS

                  Add to Reading List

                  Source URL: homeandpatioshow.com

                  Language: English - Date: 2015-02-16 12:55:13
                    UPDATE