11![JU_RECTOR_PANTONE_POSITIVE JU_RECTOR_PANTONE_POSITIVE](https://www.pdfsearch.io/img/6e55ad34d7572cbcb7c466a602354764.jpg) | Add to Reading ListSource URL: www.aquaexcel.euLanguage: English - Date: 2016-04-29 11:12:30
|
---|
12![SCWS_SteppingStones_2009_v1.0.0 SCWS_SteppingStones_2009_v1.0.0](https://www.pdfsearch.io/img/8a290b6850b281f64c944fffe9cdac71.jpg) | Add to Reading ListSource URL: simalliance.orgLanguage: English - Date: 2015-03-26 18:46:30
|
---|
13![Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter](https://www.pdfsearch.io/img/18cccbc73fd4d67e9c1911dd882b10b5.jpg) | Add to Reading ListSource URL: www.sosp2007.orgLanguage: English - Date: 2016-06-15 13:09:51
|
---|
14![Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview • Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •](https://www.pdfsearch.io/img/559b3a690dd3c282490528ace734f35f.jpg) | Add to Reading ListSource URL: www.dcddcc.comLanguage: English - Date: 2016-08-05 04:38:12
|
---|
15![The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser........................................... The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................](https://www.pdfsearch.io/img/f92dfd7a56c5b1d0c2517c591647ac38.jpg) | Add to Reading ListSource URL: grinder.sourceforge.netLanguage: English - Date: 2014-05-20 07:02:06
|
---|
16![Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004 Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004](https://www.pdfsearch.io/img/602ae7ad1179013397637dc261499f78.jpg) | Add to Reading ListSource URL: cs-www.cs.yale.eduLanguage: English - Date: 2004-07-28 23:00:33
|
---|
17![Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5 Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5](https://www.pdfsearch.io/img/ce4ecefeb70e1d59ffc10b70c4d9afb0.jpg) | Add to Reading ListSource URL: paiement.systempay.frLanguage: English - Date: 2015-12-16 04:48:58
|
---|
18![Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange](/pdf-icon.png) | Add to Reading ListSource URL: www.commoncriteriaportal.orgLanguage: English - Date: 2016-07-22 09:29:08
|
---|
19![Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan
Direction and Motivations Cryptography: the art and science of concealing Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan
Direction and Motivations Cryptography: the art and science of concealing](https://www.pdfsearch.io/img/b65f2d3d9110ca504d99c9fed894d587.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-11-23 04:37:54
|
---|
20![Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13 Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13](https://www.pdfsearch.io/img/8cc675888aea972771299faece421a0f.jpg) | Add to Reading ListSource URL: www.hobsoft.comLanguage: English - Date: 2014-01-10 07:06:54
|
---|