Security Analysis

Results: 6956



#Item
671Sociology / Welfare economics / Socioeconomics / Government / Retirement / Social protection / Social vulnerability / Social security / Institute of Development Studies / Welfare state / Social programs / Social systems

PolicyBRIEFING AFTER THE MDGS IDS POLICY ANALYSIS ISSUE 39 • JULY 2013

Add to Reading List

Source URL: www.ids.ac.uk

Language: English - Date: 2013-07-05 11:40:40
672Data / ZRTP / Secure Real-time Transport Protocol / MIKEY / SDES / Public-key cryptography / Session Initiation Protocol / SIP connection / Session border controller / Cryptographic protocols / Cryptography / Voice over IP

Security Analysis of Voice-over-IP Protocols Prateek Gupta VMWare, Inc. Vitaly Shmatikov The University of Texas at Austin

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-06-30 16:56:07
673Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security

2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:08
674Rockefeller Foundation / Food security / Humanitarian aid / Security / Urban agriculture / Norman Borlaug / International Institute for Applied Systems Analysis / Agriculture / Livestock / Science / Academia / Food and drink

Research and Impact Communiqué March 3, 2015 This communiqué brings you research and impacts from the projects we support in Africa and South Asia as well as insights into our investigators, resources, up and coming c

Add to Reading List

Source URL: lcccrsp.org

Language: English - Date: 2015-03-09 14:32:33
675Reliability engineering / Safety engineering / Risk management / ALARP / Failure mode /  effects /  and criticality analysis / Failure mode and effects analysis / Event tree / Probabilistic risk assessment / IT risk management / Risk / Security / Ethics

Chapter IV: RISK ASSESSMENT Version 2.0 – January 2007

Add to Reading List

Source URL: www.hysafe.org

Language: English
676Advantage / Control theory / Adversary / Password / Algorithm / Computer science / Applied mathematics / Analysis of algorithms / Mathematics

Quantifying Information Flow for Dynamic Secrets Piotr Mardziel,† Mário S. Alvim,‡ Michael Hicks,† and Michael R. Clarkson∗ University of Maryland, College Park Universidade Federal de Minas Gerais ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
677Computing / Domain Name System Security Extensions / DNS spoofing / Name server / Google Public DNS / Man-in-the-middle attack / PowerDNS / Anycast / CNAME record / Internet / Domain name system / Network architecture

2014 IEEE Security and Privacy Workshops Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:51
678Agriculture / Alpaca / Llama / Lama / Agricultural show / Camel / Practical Action / Agricultural extension / Textile / Camelids / Fauna of South America / Zoology

Report on Strengthening the Food Security of Alpaca Farmers, Peru July Analysis of the situation

Add to Reading List

Source URL: cdn1.practicalaction.org

Language: English - Date: 2015-06-17 15:00:56
679Software / Earth sciences / Geographic information systems / European Space Agency / ILWIS / Cartography / Envisat / AATSR / Global Earth Observation System of Systems / Spaceflight / Remote sensing / Earth

GEONETCAST AND THE EUROPEAN SPACE AGENCY DATA DISSEMINATION SYSTEM FOR FOOD AND WATER SECURITY ANALYSIS AND MONITORING IN AFRICA Dr. B (Ben) H.P. Maathuis and Dr. C (Chris) M.M. Mannaerts Department of Water Resources (W

Add to Reading List

Source URL: 52north.org

Language: English - Date: 2013-06-27 10:55:07
680Urban studies and planning / Urban decay / Food politics / Sustainable transport / Food desert / Food security / Food systems / The Food Project / Urban planning / Environment / Food and drink / Urban design

Dolly Soto Masters Student, Department of City and Regional Planning, UNC Chapel HillAn analysis of food systems planning: How can planners increase access to healthy food? February 11,

Add to Reading List

Source URL: www.planning.org

Language: English - Date: 2012-01-05 15:51:34
UPDATE