Application security

Results: 14395



#Item
681

Application Containers without Virtual Machines Micah Sherr Matt Blaze Dept. of Computer and Information Science

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2010-07-16 14:58:28
    682

    Items on the Security Personnel Application for Employment NOT included in the regular Application for Employment

    Add to Reading List

    Source URL: srq-airport.com

    Language: English - Date: 2015-05-05 08:50:23
      683

      OMB No; ExpiresI-191, Application for Advance Permission to Return to Unrelinquished Domicile Department of Homeland Security

      Add to Reading List

      Source URL: www.whglawfirm.com

      Language: English - Date: 2014-07-30 01:42:57
        684Enterprise application integration / ISO/IEC 11179 / United States Department of Justice / United States Department of Homeland Security / Java enterprise platform / National Information Exchange Model / Enterprise service bus / SEARCH /  The National Consortium for Justice Information and Statistics / Service-oriented architecture / OJB / GJXDM / Integration platform

        Open Justice Broker Concept Paper Prepared by: Scott Came, SEARCH December 15, 2010 As anyone knows who has tried to do it: Automating justice information flows and integrating justice systems are complex, difficult

        Add to Reading List

        Source URL: www.ojbc.org

        Language: English - Date: 2015-04-15 14:20:55
        685

        Trustee: Security National Bank PO Box 147 Sioux City IACAPITAL CAMPAIGN GRANT APPLICATION APPLICATION DEADLINE: Tuesday, June 30, 2015, 5:00 p.m. CDT, is the application deadline for grants awarded in 2015.

        Add to Reading List

        Source URL: thegilchristfoundation.org

        Language: English - Date: 2015-04-24 14:40:19
          686

          A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer∗ Shota Goto1 , and Junji Shikata1,2 1 2

          Add to Reading List

          Source URL: www.slab.ynu.ac.jp

          Language: English - Date: 2015-09-12 09:52:08
            687

            Replacement Social Security Card (UpdatedFill out the application form found online at http://ssa.gov/online/ss-5.pdf It’s okay if you don’t know your social security number! Don’t worry! If you don’

            Add to Reading List

            Source URL: rochesterworks.org

            Language: English - Date: 2015-03-14 18:09:07
              688

              Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion

              Add to Reading List

              Source URL: 2010.africacrypt.com

              Language: English - Date: 2010-05-23 22:32:12
                689Reconfigurable computing / Electronic engineering / Fabless semiconductor companies / Electronics / Computing / Xilinx / Field-programmable gate array / Virtex / Application-specific integrated circuit / Logic block / SciEngines GmbH

                High Performance ECC over NIST Primes on Commercial FPGAs ECC 2008, Utrecht, September 22-24, 2008 Tim Güneysu Horst Görtz Institute for IT-Security Ruhr University of Bochum, Germany

                Add to Reading List

                Source URL: www.hyperelliptic.org

                Language: English - Date: 2008-10-27 20:01:32
                690Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

                Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

                Add to Reading List

                Source URL: fc15.ifca.ai

                Language: English - Date: 2015-01-11 00:32:58
                UPDATE