−1

Results: 1637835



#Item
591Computing / Routing / Network architecture / Data transmission / Wireless networking / Internet architecture / Packet forwarding / Internet Protocol / Onion routing / Dynamic Source Routing / MORE protocol

Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
592

2018-PRESS-IPCC-SR15-181465_ar (1)

Add to Reading List

Source URL: www.ipcc.ch

Language: Arabic - Date: 2018-10-07 11:42:18
    593Cryptocurrencies / Decentralization / Bitcoin / Computing / Contract law / Information / Blockchain / Data / Business ethics / Contract / Economy

    THE LEGAL LAYER FOR A NETWORKED WORLD Published on 25 April 2018 Version: 1.0

    Add to Reading List

    Source URL: agreements.network

    Language: English - Date: 2018-09-17 12:27:40
    594Law / Terms of service / Data security / Privacy law / Internet privacy / Privacy / Data protection / Information privacy / Privacy policy / HTTP cookie / Personally identifiable information / General Data Protection Regulation

    Privacy Policy | HubDSP | 1 PRIVACY POLICY OpenLedgerApS headquartered in Denmark, is an online advertising and technology company. We provide this privacy policy so that we may inform you about how our technology (DSP)

    Add to Reading List

    Source URL: hubdsp.com

    Language: English - Date: 2018-07-23 06:33:00
    595Computing / Computer programming / C / Data types / Pointer / Hooking / Exec / Nm / Struct

    Executable Counterexamples in Software Model Checking J. Gennari1 and A. Gurfinkel2 and T. Kahsai3 and J. A. Navas4 and E. J. Schwartz1 Presenter: Natarajan Shankar4 1 Carnegie

    Add to Reading List

    Source URL: seahorn.github.io

    Language: English - Date: 2018-08-03 20:31:21
    596Financial services / Economy / Money / Payment systems / Banking / Direct debit / Bank / Payment order / Deposit account / Online banking / Single Euro Payments Area / Bank fraud

    General Terms and Conditions of Business Version datedArt. 1 Scope of validity Art. 4 Lack of capacity to act

    Add to Reading List

    Source URL: www.unionbankag.com

    Language: English - Date: 2017-12-20 11:22:30
    597I0 / Invariant / XC

    Author Proof A Specification Theory of Real-Time Processes Chris Chilton1 , Marta Kwiatkowska1 , Faron Moller2 , and Xu Wang2(B) 1 2

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2017-01-24 06:23:37
    598Artificial intelligence / World Wide Web / Human-based computation / Technology / Computer vision / Computer access control / Anti-spam / CAPTCHA / Computer security / Internet bot / Turing test / Transaction authentication number

    Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 09:05:50
    599Computing / Software engineering / Computer programming / Programming languages / Data types / Java / Programming language syntax / Object-oriented programming languages / Java syntax / Const / F / ALGOL 68

    Seuss for Java Language Reference Rajeev Joshi 1 12 FebruaryAbstract

    Add to Reading List

    Source URL: rjoshi.org

    Language: English - Date: 2010-09-11 18:26:03
    600X86 architecture / X86-64 / Z3 / Computing / Computer hardware / Computer engineering

    Verifying Curve25519 Software Yu-Fang Chen1 , Chang-Hong Hsu2 , Hsin-Hung Lin3 , Peter Schwabe4 , Ming-Hsien Tsai1 , Bow-Yaw Wang1 , Bo-Yin Yang1 , and Shang-Yi Yang1 ? 1 Institute of Information Science

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2014-12-08 15:41:25
    UPDATE