Secure

Results: 29781



#Item
481Computational complexity theory / Complexity classes / Cryptographic protocols / Secure multi-party computation / Universal composability / Digital signature / Parallel computing / Advanced Boolean Expression Language / PP / P / NC

Secure Multiparty Computation from SGX? Raad Bahmani1 , Manuel Barbosa2 , Ferdinand Brasser1 , Bernardo Portela2 , Ahmad-Reza Sadeghi1 , Guillaume Scerri3 , and Bogdan Warinschi4 1 Technische Universität Darmstadt

Add to Reading List

Source URL: fc17.ifca.ai

Language: English - Date: 2017-03-17 12:02:53
482

SECURITY POLICY FOR USER 1.Purpose: The policy aims at providing secure and acceptable use of client systems. 2.Scope: This policy is applicable to the employees in the Ministry / Department / Subordinate office of Gover

Add to Reading List

Source URL: webmail.nic.in

Language: English - Date: 2015-03-05 05:15:40
    483

    Purpose 801 -accord due process to accused delinquency -insure care/guidance/control condusive to welfare and best interests of state -secure care equivalent to that which parents

    Add to Reading List

    Source URL: www.lasc.org

    Language: English - Date: 2005-05-27 13:55:44
      484

      Microsoft Word - INDEX-FOR-THE-VMARS-SIGNAL-JOURNAL

      Add to Reading List

      Source URL: secure.toolkitfiles.co.uk

      Language: English - Date: 2017-12-13 11:10:15
        485

        APR2i: PacketRunner2 with Intel Processor Legacy to LTE Secure Data & Control Plane Application and Packet Processing for LTE and

        Add to Reading List

        Source URL: adax.com

        Language: English - Date: 2016-08-23 05:20:19
          486

          REVIEWS Book Quadrangles and a Quandary

          Add to Reading List

          Source URL: secure.toolkitfiles.co.uk

          Language: English - Date: 2016-11-18 09:55:51
            487

            ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility trend, and t

            Add to Reading List

            Source URL: info.varonis.com

            Language: English - Date: 2017-10-07 03:56:26
              488

              International Journal of Advanced Networking & Applications (IJANA) Volume: 08, Issue: 05 Pages: Special Issue 14 A Secure Data Self-Destructing Scheme

              Add to Reading List

              Source URL: www.ijana.in

              Language: English - Date: 2017-04-01 04:09:55
                489Computing / Software engineering / Computer programming / Ajax / JavaScript libraries / Cross-platform software / JavaScript / Web programming / JQuery / Caja project / Prototype JavaScript Framework / Cross-site scripting

                Preventing Capability Leaks in Secure JavaScript Subsets Matthew Finifter, Joel Weinberger, and Adam Barth University of California, Berkeley {finifter, jww, abarth}@cs.berkeley.edu Abstract

                Add to Reading List

                Source URL: www.adambarth.com

                Language: English - Date: 2010-01-24 14:14:38
                490

                Delaware State Housing Authority Application Form __________________________________________________________________________________________________________________________________________________________________________

                Add to Reading List

                Source URL: secure.destatehousing.com

                Language: English - Date: 2017-09-21 14:27:33
                  UPDATE