Covert

Results: 573



#Item
121Diagnosing covert pied-piping* Michael Yoshitaka Erlewine & Hadas Kotek, MIT, \NJUDIP
ILPUFL^!NJUFEV (4)  North East Linguistic Society 43, CUNY, October 2012

Diagnosing covert pied-piping* Michael Yoshitaka Erlewine & Hadas Kotek, MIT, \NJUDIP ILPUFL^!NJUFEV (4) North East Linguistic Society 43, CUNY, October 2012

Add to Reading List

Source URL: hkotek.com

Language: English
122Next-Generation Multi-mission ISR and Strike Aircraft OBJECTIVE Perform high-speed, long-endurance, more covert multi-mission Intelligence, Surveillance, Reconnaissance (ISR) and precision-strike missions over land or s

Next-Generation Multi-mission ISR and Strike Aircraft OBJECTIVE Perform high-speed, long-endurance, more covert multi-mission Intelligence, Surveillance, Reconnaissance (ISR) and precision-strike missions over land or s

Add to Reading List

Source URL: www.industrie.com

Language: English - Date: 2014-02-25 10:43:58
123Title: Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Speaker: Alejandro Russo Abstract: When termination of a program is observable by an adversary, confidential information may

Title: Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Speaker: Alejandro Russo Abstract: When termination of a program is observable by an adversary, confidential information may

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:09
124DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
1252015 IEEE CS Security and Privacy Workshops  Passing go with DNA sequencing: Delivering messages in a covert transgenic channel Ji Young Chun

2015 IEEE CS Security and Privacy Workshops Passing go with DNA sequencing: Delivering messages in a covert transgenic channel Ji Young Chun

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:26:41
    126Thomas R. Covert Department of Economics University of Chicago 1126 East 59th Street Chicago, IL 60637

    Thomas R. Covert Department of Economics University of Chicago 1126 East 59th Street Chicago, IL 60637

    Add to Reading List

    Source URL: home.uchicago.edu

    Language: English - Date: 2015-02-27 15:22:35
      1271995 — Fast Idol, Spectre in the Covert Memory — Bonehead — Wet, Rogue Tool, Corrupted — All the Better to Eat You With, Zero, Live Acts Program — Hydra, Ei Fallen, Crumpled, Butter

      1995 — Fast Idol, Spectre in the Covert Memory — Bonehead — Wet, Rogue Tool, Corrupted — All the Better to Eat You With, Zero, Live Acts Program — Hydra, Ei Fallen, Crumpled, Butter

      Add to Reading List

      Source URL: chunkymove.com.au

      Language: English - Date: 2015-05-19 23:20:49
      128Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

      Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-16 05:37:56
      129EXTERNAL ADVERTISEMENT: ENTRY LEVEL PUBLIC SERVICE ACT POSTS ON SALARY LEVEL 5: DIVISION: CRIME INTELLIGENCE 1. The posts contained in this circular are vacant and herewith advertised for appointment purposes as prescrib

      EXTERNAL ADVERTISEMENT: ENTRY LEVEL PUBLIC SERVICE ACT POSTS ON SALARY LEVEL 5: DIVISION: CRIME INTELLIGENCE 1. The posts contained in this circular are vacant and herewith advertised for appointment purposes as prescrib

      Add to Reading List

      Source URL: www.saps.gov.za

      Language: English - Date: 2015-06-12 04:21:11
      130Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

      Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-16 05:37:56