Security Properties

Results: 169



#Item
51Wi-Fi Protected Access / Checkbox / Wi-Fi / Password / Computing / Technology / Telecommunications engineering / Wireless security / Features new to Windows XP / Computer network security / Wireless networking / IEEE 802.11

Windows XP LTU Network connection instructions 1. Go to Start > Connect To 2. Right-click Wireless Network Connection, then select Properties. A new window opens. Select Internet Protocol (TCP/IP), then click the Propert

Add to Reading List

Source URL: www.ltu.edu

Language: English - Date: 2012-09-26 14:02:26
52Logic / Computing / Mathematics / Theoretical computer science / Burrows–Abadi–Needham logic / Free variables and bound variables / Π-calculus / Needham–Schroeder protocol / Applied mathematics / Cryptographic protocols / Cryptography / Predicate logic

Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-12-15 20:24:55
53Irrigation / Water conservation / Environment / Behavior / Self / Self-determination theory / Motivation / Rainwater tank / Intrinsic and extrinsic properties / Mind / Appropriate technology / DIY culture

Urban Water Security Research Alliance Rainwater Tank Adoption in South East Queensland – Factors Influencing Maintenance and Management Dave Tucker

Add to Reading List

Source URL: www.urbanwateralliance.org.au

Language: English - Date: 2013-01-09 19:56:45
54Financial institutions / Institutional investors / Crime prevention / Insurance / Pension / Security guard / Academi / Invoice / Financial economics / Security / Business

Steven R. Keller and Associates, Inc. Pre-Paid Security Consulting Plan for Museums and Cultural Properties. Plan Agreement This agreement for Pre-Paid Security Consulting Services between Steven R. Keller and Associates

Add to Reading List

Source URL: museum-security.org

Language: English - Date: 2001-03-01 14:25:11
55Environment / Moreton Bay Region / Outdoor water-use restriction / Caboolture /  Queensland / Irrigation / Fire sprinkler system / Rainwater tank / Narangba /  Queensland / Morayfield /  Queensland / Water conservation / Geography of Queensland / Water

Urban Water Security Research Alliance A Preliminary Analysis of Potable Water Savings from Mandated Rainwater Tanks in New Residential Properties in SEQ Cara Beal

Add to Reading List

Source URL: www.urbanwateralliance.org.au

Language: English - Date: 2013-01-09 19:54:47
56Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-27 15:51:40
57Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
58Water / Aquatic ecology / Systems ecology / European Space Agency / Global Monitoring for Environment and Security / Space policy of the European Union / Continuous Plankton Recorder / Ecosystem / HELCOM / Oceanography / Planktology / Biology

EU FP7 | OPEC | D5.1 | Current status of routine monitoring of ecosystem properties in European regional seas| December 2013 OPerational ECology Ecosystem forecast products to enhance marine GMES applications

Add to Reading List

Source URL: www.marineopec.eu

Language: English - Date: 2015-03-30 11:54:20
59Computing / Kerberos / Integrated Windows Authentication / Single sign-on / Authentication server / Secure Shell / Authentication / AKA / Proxy server / Cryptography / Computer network security / Computer security

Symmetric and Asymmetric Authentication: A Study of Symmetric and Complementary Properties and Their Effect on Interoperability and Scalability in Distributed Systems Olga Kornievskaia

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-06-12 12:33:53
60Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:33:31
UPDATE