Physical security

Results: 2313



#Item
1Locksmithing / Security / Prevention / Gates / Rekeying / Bit / Pin tumbler lock / Master keying / Lock / Padlock / Lever tumbler lock / Warded lock

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs – Research , PREPRINT — 15 SeptRevised 2 MarchA version o

Add to Reading List

Source URL: www.mattblaze.org

Language: English - Date: 2003-03-10 20:37:31
2

HOME SECURITY SDPD Crime Prevention October 4, 2017 CONTENTS CONTROLLING ACCESS Physical Measures

Add to Reading List

Source URL: www.sandiego.gov

Language: English - Date: 2017-11-01 16:31:36
    3

    1 Control-Theoretic Methods for Cyber-Physical Security Fabio Pasqualetti, Florian D¨orfler, and Francesco Bullo

    Add to Reading List

    Source URL: motion.me.ucsb.edu

    Language: English - Date: 2013-09-14 00:54:32
      4

      ® Security is a Shared Responsibility The adoption of public cloud computing among established businesses and startups is outpacing the adoption of new cybersecurity defenses. The absence of a physical network boundary

      Add to Reading List

      Source URL: info.redlock.io

      Language: English - Date: 2018-03-12 12:45:49
        5

        Cyber-Physical Security Via Geometric Control: Distributed Monitoring and Malicious Attacks

        Add to Reading List

        Source URL: www.fabiopas.it

        Language: English - Date: 2017-07-12 04:52:37
          6

          Formal Reasoning about Physical Properties of Security Protocols DAVID BASIN, SRDJAN CAPKUN, PATRICK SCHALLER, and BENEDIKT SCHMIDT ETH Zurich, Switzerland Traditional security protocols are mainly concerned with authen

          Add to Reading List

          Source URL: www.inf.ethz.ch

          Language: English - Date: 2011-09-22 05:55:49
            7

            Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

            Add to Reading List

            Source URL: fc05.ifca.ai

            Language: English - Date: 2005-01-13 13:56:52
              8

              On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards Ryan Zhou, Yu Yu, F-X Standaert, Jean-Jacques Quisquater Brightsight

              Add to Reading List

              Source URL: fc13.ifca.ai

              Language: English - Date: 2013-04-04 03:04:00
                9

                From the EIC Cyber–Physical Systems Security and Privacy  The focus of this issue of IEEE Design&Test

                Add to Reading List

                Source URL: cesweb.itec.kit.edu

                Language: English - Date: 2017-12-11 05:30:17
                  10

                  INTEGRATING CYBER-PHYSICAL SECURITY FOR A SAFER CITY Addressing the Emerging Risks to Critical Infrastructure with Cyber-Physical Solutions US$ US$

                  Add to Reading List

                  Source URL: br.nec.com

                  - Date: 2017-11-27 05:20:45
                    UPDATE