Extended Access Control

Results: 52



#Item
11Kazakhstan The Kazakh government has extended its control over the Internet, even as it seeks to liberalize the telecommunications market and position itself as a major IT power in the region. The state uses its signific

Kazakhstan The Kazakh government has extended its control over the Internet, even as it seeks to liberalize the telecommunications market and position itself as a major IT power in the region. The state uses its signific

Add to Reading List

Source URL: www.access-controlled.net

Language: English - Date: 2012-08-10 17:13:29
12USB Monitor Control Class Specification  Revision 1.0 January 5, 1998  USB Monitor Control Class Specification

USB Monitor Control Class Specification Revision 1.0 January 5, 1998 USB Monitor Control Class Specification

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2014-09-03 16:00:32
13TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version) Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith Dartmouth Computer Science Technical Report TR2008-63

TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version) Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith Dartmouth Computer Science Technical Report TR2008-63

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:12
14USB Monitor Control Class Specification  Revision 1.0 January 5, 1998  USB Monitor Control Class Specification

USB Monitor Control Class Specification Revision 1.0 January 5, 1998 USB Monitor Control Class Specification

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2013-12-18 19:25:24
15Specification of the Exim Mail Transfer Agent Exim Maintainers Specification of the Exim Mail Transfer Agent Author: Exim Maintainers

Specification of the Exim Mail Transfer Agent Exim Maintainers Specification of the Exim Mail Transfer Agent Author: Exim Maintainers

Add to Reading List

Source URL: www.no.exim.org

Language: English - Date: 2015-01-12 10:13:04
16SELinux Quick Start Guide  SELinux Quick Start Guide Revision History Revision $Revision: 1.1 $ $Date: [removed]:21:26 $ Revised by: pd

SELinux Quick Start Guide SELinux Quick Start Guide Revision History Revision $Revision: 1.1 $ $Date: [removed]:21:26 $ Revised by: pd

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-01-03 14:54:00
17SOUTHERN AREA INTERAGENCY INCIDENT MANAGEMENT ANNOUNCEMENT/APPLICATION WEBSITE ANNOUNCEMENT CLOSES: Extended to November 1, 2013 OBJECTIVES: To build and maintain teams of highly qualified and motivated specialists who a

SOUTHERN AREA INTERAGENCY INCIDENT MANAGEMENT ANNOUNCEMENT/APPLICATION WEBSITE ANNOUNCEMENT CLOSES: Extended to November 1, 2013 OBJECTIVES: To build and maintain teams of highly qualified and motivated specialists who a

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2015-02-18 01:16:54
18Specification of the Exim Mail Transfer Agent Exim Maintainers Specification of the Exim Mail Transfer Agent Author: Exim Maintainers

Specification of the Exim Mail Transfer Agent Exim Maintainers Specification of the Exim Mail Transfer Agent Author: Exim Maintainers

Add to Reading List

Source URL: exim.org

Language: English - Date: 2015-01-12 10:13:04
19In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, 1990, pp[removed]Preprint)  ITOSS: An Integrated Toolkit For Operating System Security.1 (Extended Abstract) Michael Rabin

In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, 1990, pp[removed]Preprint) ITOSS: An Integrated Toolkit For Operating System Security.1 (Extended Abstract) Michael Rabin

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:45:08
20This is the full version of an extended abstract published in ACM CCS[removed]Posted as Report[removed]on 19 August 2013; revised 8 September[removed]Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase

This is the full version of an extended abstract published in ACM CCS[removed]Posted as Report[removed]on 19 August 2013; revised 8 September[removed]Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-16 08:51:21