Secure

Results: 29781



#Item
501

Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana†

Add to Reading List

Source URL: web.cs.ucla.edu

Language: English - Date: 2017-11-29 01:25:51
    502

    Secure Cryptographic Protocols for E-commerce Transaction on the Internet

    Add to Reading List

    Source URL: www.sgs.cityu.edu.hk

    Language: English - Date: 2004-01-08 09:10:43
      503Economy / Cryptocurrencies / Money / Notary public / Optical fiber connector / Blockchain / Payment / Escrow / Ripple / D-subminiature / Debits and credits / Ethereum

      A Protocol for Interledger Payments Stefan Thomas & Evan Schwartz {stefan,evan}@ripple.com Abstract We present a protocol for payments across payment systems. It enables secure transfers between ledgers and

      Add to Reading List

      Source URL: blockchainlab.com

      Language: English - Date: 2017-04-20 02:30:26
      504

      Strategies that Support Children in the Area of Social and Emotional Development Relationships with Others Build relationships with parents so that children feel safe, secure, and comfortable with their teachers.9 With

      Add to Reading List

      Source URL: rields.com

      Language: English - Date: 2015-06-25 17:51:30
        505

        Memminger Auditorium Venue Reservation Application Please note this form is for inquiry only – information provided does not secure a hold for the venue. Client Information: Individual and/or Group Name of Applicant: A

        Add to Reading List

        Source URL: memmingerauditorium.com

        Language: English - Date: 2017-09-19 17:52:54
          506

          Ruby - Red iDocket.com, LLC “Advanced Website Service for Court Records” Display REDACTED civil, criminal, and probate case information on the Internet

          Add to Reading List

          Source URL: secure.idocket.com

          Language: English - Date: 2010-08-16 11:24:00
            507

            SUPPORTING STUDENTS THROUGH EFFECTIVE EDUCATORS EVIDENCE-BASED STRATEGIES TO INCREASE STUDENT LEARNING December 11, 2017

            Add to Reading List

            Source URL: secure.edweek.org

            Language: English - Date: 2017-12-11 15:40:20
              508

              Introducing the First Enterprise-Ready, End-To-End, Biometric Authentication for the Microsoft Ecosystem Secure Your Entire Enterprise ImageWare GoVerifyID Enterprise Suite provides high assurance authentication with unl

              Add to Reading List

              Source URL: goverifyid.com

              Language: English - Date: 2016-11-11 20:31:47
                509

                Preventing Capability Leaks in Secure JavaScript Subsets Matthew Finifter, Joel Weinberger, and Adam Barth University of California, Berkeley {finifter, jww, abarth}@cs.berkeley.edu Abstract

                Add to Reading List

                Source URL: webblaze.cs.berkeley.edu

                Language: English - Date: 2014-11-17 18:57:29
                  510

                  By John Dixon Hunt At the end of the celebrations for ‘Capability’ Brown’s tercentenary, there is still more to be said about the great designer. A

                  Add to Reading List

                  Source URL: secure.toolkitfiles.co.uk

                  Language: English - Date: 2017-03-06 10:53:01
                    UPDATE