Beyond Security

Results: 583



#Item
1Formal Expression of BBc-1 Mechanism and Its Security Analysis Jun KURIHARA† and Takeshi KUBO†† †  ††

Formal Expression of BBc-1 Mechanism and Its Security Analysis Jun KURIHARA† and Takeshi KUBO†† † ††

Add to Reading List

Source URL: beyond-blockchain.org

Language: English - Date: 2017-10-30 20:24:43
    2NSF Proposal  TWC: Frontier: Collaborative: Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives Stefan Savage, Geoffrey M. Voelker, James Fowler, Alex Snoeren,

    NSF Proposal TWC: Frontier: Collaborative: Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives Stefan Savage, Geoffrey M. Voelker, James Fowler, Alex Snoeren,

    Add to Reading List

    Source URL: evidencebasedsecurity.org

    Language: English - Date: 2012-08-23 18:52:09
      3Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels   Thomas Ristenpart

      Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels Thomas Ristenpart

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2014-02-28 19:09:23
        4You are not your developer, either A research agenda for usable privacy and security beyond end users Yasemin Acar, Sascha Fahl, and Michelle Mazurek CISPA, Saarland University

        You are not your developer, either A research agenda for usable privacy and security beyond end users Yasemin Acar, Sascha Fahl, and Michelle Mazurek CISPA, Saarland University

        Add to Reading List

        Source URL: cybersec-prod.s3.amazonaws.com

        - Date: 2016-12-05 15:22:43
          5Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes? Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1  2

          Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes? Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-09-10 02:45:52
            6Beyond Network Security: Trends, Challenges,  and Solutions to Protect the Cloud Presented by Jaeson Yoo SVP Business Development, Penta Security Systems

            Beyond Network Security: Trends, Challenges, and Solutions to Protect the Cloud Presented by Jaeson Yoo SVP Business Development, Penta Security Systems

            Add to Reading List

            Source URL: res.cdn.sys-con.com

            - Date: 2016-12-09 09:48:47
              7At-a-Glance  Cisco ASA with FirePOWER Services Evolution Beyond Traditional “Defense in Depth” Security

              At-a-Glance Cisco ASA with FirePOWER Services Evolution Beyond Traditional “Defense in Depth” Security

              Add to Reading List

              Source URL: www.cisco.com

                8BEYOND CJIS: ENHANCED SECURITY, NOT JUST COMPLIANCE PROTECT LIFE. PROTECT TRUTH.

                BEYOND CJIS: ENHANCED SECURITY, NOT JUST COMPLIANCE PROTECT LIFE. PROTECT TRUTH.

                Add to Reading List

                Source URL: prismic-io.s3.amazonaws.com

                - Date: 2016-06-02 13:25:05
                  9An NCC Group Publication Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond  Prepared by:

                  An NCC Group Publication Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond Prepared by:

                  Add to Reading List

                  Source URL: www.nccgroup.trust

                    10

                    Privacy Policy Beyond the Pond is committed to protecting your privacy. We maintain the privacy of your information using security technologies and adhere to policies that prevent unauthorized use of your personal inform

                    Add to Reading List

                    Source URL: beyondthepondusa.com

                    - Date: 2016-04-26 15:12:54