Secure

Results: 29781



#Item
271

TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 1, NO. 8, AUGUSTTiming Attacks on Access Privacy in Information Centric Networks and Countermeasures

Add to Reading List

Source URL: www.cs.ucf.edu

Language: English - Date: 2017-08-24 12:04:23
    272

    Proceedings on Privacy Enhancing Technologies ; ):1–20 Cecylia Bocovich and Ian Goldberg Secure asymmetry and deployability for decoy routing systems

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2018-03-08 15:08:18
      273

      ACCELERATED ACCESS SOLUTION: Do your clients worry about the possibility of future chronic illness? By adding the Accelerated Access Solution® (AAS) rider to a Secure Lifetime GUL 3, Max Accumulator+ or Value+ Protecto

      Add to Reading List

      Source URL: www.retirestronger.com

      Language: English - Date: 2018-04-13 17:09:17
        274

        IEEE Secure Development Conference Cambridge MA, September 30 - October 2, 2018 IEEE Secure Development (SecDev) is a venue for presenting ideas, research, and experience about how to develop secure systems. SecDev

        Add to Reading List

        Source URL: s3.amazonaws.com

        Language: English - Date: 2017-11-28 11:33:37
          275

          OPEN TO THE PUBLIC AND TRADE 6 JAMES P MURPHY HWY, WEST WARWICK, RIEASY OFF RT 95 EXIT 8, BEHIND CARDI’S SUN 11-6, MON - WED & FRI 10-6, THUR & SAT 10-8 RIDESIGNCENTER.COM

          Add to Reading List

          Source URL: localfusion.secure.ownlocal.com

          - Date: 2018-06-10 04:50:19
            276

            THE STRUCTURE OF SECURE MULTI-PARTY COMPUTATION BY MICHAEL J. ROSULEK B.S., Iowa State University, 2003

            Add to Reading List

            Source URL: web.engr.oregonstate.edu

            Language: English - Date: 2012-01-23 00:46:40
              277

              Fabric: A Platform for Secure Distributed Computation and Storage Jed Liu Michael D. George K. Vikram Xin Qi Lucas Waye

              Add to Reading List

              Source URL: www.cs.cornell.edu

              Language: English - Date: 2013-01-07 23:08:55
                278

                Teaching Coding in Journalism Schools: Considerations for a Secure Technological Infrastructure Meredith Broussard New York University 20 Cooper Square #702 New York, NY 10003

                Add to Reading List

                Source URL: cj2015.brown.columbia.edu

                Language: English - Date: 2015-10-01 12:16:30
                  279

                  CORPORATE PROFILE 〒 東京都千代田区大手町1-7-2 東京サンケイビル TEL:(代表) www.nri-secure.co.jp

                  Add to Reading List

                  Source URL: www.nri-secure.co.jp

                  Language: Japanese - Date: 2018-07-24 05:58:10
                    280

                    Dynamic Data Citation Making Evolving Research Data Citable Stefan Pröll Secure Business Austria Vienna, Austria

                    Add to Reading List

                    Source URL: www.ieee-tcdl.org

                    Language: English - Date: 2014-09-15 03:01:58
                      UPDATE