Security University

Results: 12075



#Item
941

IEEE Symposium on Security and Privacy, San Jose, CA, MayDynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign • The inform

Add to Reading List

Source URL: seclab.illinois.edu

Language: English - Date: 2014-03-29 23:43:25
    942Cryptography / Security / Computer security / Computer access control / Computer network security / Barcodes / Cybercrime / Hypermedia / QR code / Authentication / Password / SQRL

    SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) Jonathan Millican and Frank Stajano , University of Cambridge Computer Laboratory, Cambr

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-07-13 10:08:14
    943Computing / Computer hardware / Computer data storage / Computer storage devices / Backup / Data security / File server / Network-attached storage / Drive / Solid-state drive / Google Drive

    Share Data Storage Agreement – S Drive 1.0 Overview This S Drive Storage Service Level Agreement (SLA) is between the University of Arkansas - Division of Agriculture and the faculty and staff using the S Drive storage

    Add to Reading List

    Source URL: agritech.uark.edu

    Language: English - Date: 2015-10-27 11:40:24
    944Systemic risk / Prime brokerage / Federal Reserve System / Derivative / Hedge fund / Repurchase agreement / Financial crisis of 200708 / Money market / Bank / Goldman Sachs / Security / Credit risk

    The Failure Mechanics of Dealer Banks Darrell Duffie Graduate School of Business, Stanford University∗ First Draft: May 15, This draft: July 23, 2009.

    Add to Reading List

    Source URL: www.q-group.org

    Language: English - Date: 2016-03-25 20:51:28
    945

    University of California, Irvine Campus Security Authority (CSA) No Incidents to Report If you have an incident to report, please fill out Pages 2-4 for each Clery crime you have to report. Do not fill out this Page 1 se

    Add to Reading List

    Source URL: police.uci.edu

    Language: English - Date: 2015-10-06 11:57:50
      946Rape / Behavior / Sexual abuse / New Mexico / Violence / Sex crimes / Criminology / Gender studies / New Mexico State University / Sexual assault / Carlsbad /  New Mexico / Laws regarding rape

      New  Mexico  State  University     2015   Annual  Security  Report    

      Add to Reading List

      Source URL: carlsbad.nmsu.edu

      Language: English - Date: 2015-10-01 10:40:51
      947

      Opportunities for Language Based Information Flow Security in Sensor Networks Victor Shnayder Harvard University

      Add to Reading List

      Source URL: www.eecs.harvard.edu

      Language: English - Date: 2010-08-19 02:00:16
        948

        2015 IEEE Symposium on Security and Privacy Towards Making Systems Forget with Machine Unlearning Yinzhi Cao and Junfeng Yang Columbia University {yzcao, junfeng}@cs.columbia.edu

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2015-05-11 16:43:24
          949Hacking / Web design / Digital typography / News aggregators / Social engineering / Cross-site scripting / Cross-site request forgery / NoScript / Content Security Policy / JavaScript / Clickjacking / Cascading Style Sheets

          Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

          Add to Reading List

          Source URL: www.nds.rub.de

          Language: English - Date: 2012-08-16 02:39:46
          UPDATE