and Security

Results: 171768



#Item
871Cryptocurrencies / Bitcoin / Blockchains / Alternative currencies / Computing / Concurrent computing / Distributed computing / ETH Zurich / Ethereum / RootStock

Arthur Gervais I am motivated by revolutionizing how society trades and interacts. Bitcoin and the security properties of its blockchain provide technical means to catalyze societal evolution. My resear

Add to Reading List

Source URL: www.arthurgervais.com

Language: English - Date: 2016-11-14 10:46:36
872

Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants Weipeng Lin, Ke Wang, Zhilin Zhang Hong Chen

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2017-03-23 16:39:12
    873

    CASUALTY ASSISTANCE CHECKLIST (to be completed by retired Soldier and/or spouse and kept in your files for your survivors to use) Name: Social Security Number:

    Add to Reading List

    Source URL: redwarriors.us

    Language: English - Date: 2017-10-26 12:45:02
      874

      Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋆ Ling Song1,2,3 , Zhangjie Huang1,2( ) , Qianqian Yang1,2 1 State Key Laboratory of Information Security, Institute of Informati

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2017-07-03 21:45:35
        875

        THE CO L L EGE OF NEW JERS EYAnnual Security and

        Add to Reading List

        Source URL: campuspolice.pages.tcnj.edu

        Language: English - Date: 2010-10-18 11:53:02
          876

          Threats to Philippine National Security 163 Current Terrorist Groups and Emerging Extremist Armed Movements in the Southern Philippines:

          Add to Reading List

          Source URL: www.ndcp.edu.ph

          Language: English - Date: 2014-01-12 22:05:56
            877

            The Nautilus Institute for Security and Sustainability The  Higher  Management  of  Pine  Gap Desmond Ball, Bill Robinson, and Richard Tanter Nautilus Institute for Security and Sustainability

            Add to Reading List

            Source URL: nautilus.org

            Language: English - Date: 2015-09-14 18:59:31
              878

              2011 IEEE Symposium on Security and Privacy Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach Vineeth Kashyap

              Add to Reading List

              Source URL: oaklandsok.github.io

              Language: English - Date: 2018-03-14 15:33:55
                879

                The procedures below give you step by step instructions for setting up security questions for the password reset option and making your passwords for most systems the same. During this process, students will need your PA

                Add to Reading List

                Source URL: jedi.tcnj.edu

                Language: English - Date: 2011-11-02 16:07:00
                  UPDATE