Beyond Security

Results: 583



#Item
1

Formal Expression of BBc-1 Mechanism and Its Security Analysis Jun KURIHARA† and Takeshi KUBO†† † ††

Add to Reading List

Source URL: beyond-blockchain.org

Language: English - Date: 2017-10-30 20:24:43
    2

    NSF Proposal TWC: Frontier: Collaborative: Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives Stefan Savage, Geoffrey M. Voelker, James Fowler, Alex Snoeren,

    Add to Reading List

    Source URL: evidencebasedsecurity.org

    Language: English - Date: 2012-08-23 18:52:09
      3

      Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels Thomas Ristenpart

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2014-02-28 19:09:23
        4

        You are not your developer, either A research agenda for usable privacy and security beyond end users Yasemin Acar, Sascha Fahl, and Michelle Mazurek CISPA, Saarland University

        Add to Reading List

        Source URL: cybersec-prod.s3.amazonaws.com

        - Date: 2016-12-05 15:22:43
          5

          Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes? Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-09-10 02:45:52
            6

            Beyond Network Security: Trends, Challenges, and Solutions to Protect the Cloud Presented by Jaeson Yoo SVP Business Development, Penta Security Systems

            Add to Reading List

            Source URL: res.cdn.sys-con.com

            - Date: 2016-12-09 09:48:47
              7

              At-a-Glance Cisco ASA with FirePOWER Services Evolution Beyond Traditional “Defense in Depth” Security

              Add to Reading List

              Source URL: www.cisco.com

                8

                BEYOND CJIS: ENHANCED SECURITY, NOT JUST COMPLIANCE PROTECT LIFE. PROTECT TRUTH.

                Add to Reading List

                Source URL: prismic-io.s3.amazonaws.com

                - Date: 2016-06-02 13:25:05
                  9

                  An NCC Group Publication Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond Prepared by:

                  Add to Reading List

                  Source URL: www.nccgroup.trust

                    10

                    Privacy Policy Beyond the Pond is committed to protecting your privacy. We maintain the privacy of your information using security technologies and adhere to policies that prevent unauthorized use of your personal inform

                    Add to Reading List

                    Source URL: beyondthepondusa.com

                    - Date: 2016-04-26 15:12:54
                      UPDATE