Application security

Results: 14395



#Item
651

STATE OF APPLICATION SECURITY VOL. 4, 2015 STATE OF PIRACY

Add to Reading List

Source URL: www.arxan.co.jp

Language: English - Date: 2015-08-25 01:34:26
    652Internet privacy / Network performance / Dark web / Wireless networking / Telecommunications engineering / Tor / Routing / Anonymity / Proxy server / Crowds / Anonymous remailer / Secure communication

    The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2013-10-29 14:55:45
    653

    Print Form Trustee: Security National Bank PO Box 147 Sioux City IAENDOWMENT GRANT APPLICATION FORM APPLICATION DEADLINE: Tuesday, June 30, 2015, 5:00 p.m. CDT, is the application deadline for grants awarded

    Add to Reading List

    Source URL: thegilchristfoundation.org

    Language: English - Date: 2015-04-24 14:40:19
      654

      e-Notification of Application/Petition Acceptance USCIS Form G-1145 Department of Homeland Security U.S. Citizenship and Immigration Services

      Add to Reading List

      Source URL: www.whglawfirm.com

      Language: English - Date: 2014-07-29 12:54:28
        655

        Affine Equivalence and its Application to Tightening Threshold Implementations Pascal Sasdrich, Amir Moradi, Tim G¨ uneysu Horst G¨ ortz Institute for IT Security, Ruhr-Universit¨

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-07-27 07:13:27
          656

          Social Welfare Services J/IRL1 Application form for Irish benefits under the agreement on social security between the government of Ireland and the government of

          Add to Reading List

          Source URL: www.plumandapple.jp

          Language: English - Date: 2014-07-16 20:34:57
            657Cryptography / Ambient intelligence / Internet of things / Crime prevention / National security / Constrained Application Protocol / Internet privacy / Computer security / Cloud computing / Big data / Privacy / Information privacy

            ESORICS 2015 Program Guide Workshop only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

            Add to Reading List

            Source URL: esorics2015.sba-research.org

            Language: English - Date: 2015-09-16 12:07:44
            658Software / Computing / Smartphones / User interface techniques / ITunes / Mobile operating systems / Cross-platform software / Mobile app / Google Play / App store / Web application / Android version history

            A Large-Scale Study of Mobile Web App Security Patrick Mutchler∗ , Adam Doup´e† , John Mitchell∗ , Chris Kruegel‡ and Giovanni Vigna‡ ∗ Stanford University {pcm2d, mitchell}@stanford.edu

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2015-05-20 23:58:55
            659Computing / Software engineering / Software / Web development / Functional languages / Web programming / Hacking / Web applications / JavaScript / Opa / Cross-site scripting / Cross-site request forgery

            Dagstuhl SeminarWeb Application Security 29.03. – Executive Summary Dan Boneh1 , Ulfar Erlingsson2 , Martin Johns3 and Benjamin Livshits4 1

            Add to Reading List

            Source URL: drops.dagstuhl.de

            Language: English - Date: 2010-08-09 09:34:32
            660

            SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is free! USE THIS APPLICATION TO: 

            Add to Reading List

            Source URL: www.masstpc.org

            Language: English - Date: 2012-07-24 19:50:59
              UPDATE