Concórdia

Results: 2755



#Item
261

Scribe Notes: Lecture 3 COMPApplied Cryptography - Winter 2013 January 29, Stream Ciphers message {0,1}n

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:57
    262

    Lecture:  Security  and  MACs     Notes  Feb  5th:     Topics  covered:  Security  games,  Security  modes  of  operation,  MAC’s     Topic  one:  One  

    Add to Reading List

    Source URL: users.encs.concordia.ca

    Language: English - Date: 2013-08-05 10:54:57
      263

      sAllan  Wee   Cryptography   HTTPS  (Continued)   A3  -­‐>  Due  next  class  April  4th   Evaluations  -­‐>  online  (see  your  email)   Scribes:  Rabil

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2013-08-05 10:54:59
        264

        IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Finding and Evaluating the Performance Impact of Redundant Data Access for Applications that

        Add to Reading List

        Source URL: users.encs.concordia.ca

        Language: English - Date: 2016-04-06 10:47:05
          265

          Studying the Impact of Clones on Software Defects Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, Bram Adams, Ahmed E. Hassan, Ying Zou Queen‟s University Kingston, Canada , , {

          Add to Reading List

          Source URL: users.encs.concordia.ca

          Language: English - Date: 2015-08-14 09:57:50
            266

            Software Security Hardware Firmware Applications       OS  

            Add to Reading List

            Source URL: users.encs.concordia.ca

            Language: English - Date: 2014-03-17 15:07:12
              267

              Bridging the Divide between Software Developers and Operators using Logs Weiyi Shang Software Analysis and Intelligence Lab (SAIL), Queen’s University, Canada Abstract—There is a growing gap betwee

              Add to Reading List

              Source URL: users.encs.concordia.ca

              Language: English - Date: 2015-08-14 09:57:49
                268

                blockchain- based voting potential & limitations Jeremy Clark (@PulpSpy)

                Add to Reading List

                Source URL: users.encs.concordia.ca

                - Date: 2016-05-31 10:21:00
                  269

                  Studying the Effectiveness of Application Performance Management (APM) Tools for Detecting Performance Regressions for Web Applications: An Experience Report Tarek M. Ahmed1 , Cor-Paul Bezemer1 , Tse-Hsun Chen1 , Ahmed E

                  Add to Reading List

                  Source URL: users.encs.concordia.ca

                  Language: English - Date: 2016-04-04 10:36:39
                    270

                      INSE: 6150 SECURITY EVALUATION METHODOLOGY LECTRUE NOTES ON REQUIRMENTS ENGINEERING, COMMON CRITERIA AND CASE STUDY

                    Add to Reading List

                    Source URL: users.encs.concordia.ca

                    Language: English - Date: 2014-02-10 17:40:20
                      UPDATE