Security University

Results: 12075



#Item
111Theoretical computer science / Quantum information science / Quantum mechanics / Quantum computing / Models of computation / Logic gates / Quantum gates / Quantum logic gate / Quantum circuit / Qubit / Toffoli gate / Controlled NOT gate

Solving binary MQ with Grover’s algorithm Peter Schwabe and Bas Westerbaan ? Digital Security Group, Radboud University

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2016-09-12 11:55:28
112

Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2011-06-20 08:16:21
    113

    Annual Security Report Indiana University Purdue University Programs at Fort Wayne September

    Add to Reading List

    Source URL: protect.iu.edu

    Language: English - Date: 2018-06-25 10:18:30
      114

      Tearing Java Cards Engelbert Hubbers, Wojciech Mostowski, and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands

      Add to Reading List

      Source URL: ceres.hh.se

      Language: English - Date: 2015-05-16 14:50:20
        115

        Social Security Number Policy Guidelines Information Technology Services All departments were instructed to be in compliance with the University of Nebraska at Kearney Social Security Number Policy by January 1, 2008. Th

        Add to Reading List

        Source URL: www.unk.edu

        Language: English - Date: 2018-08-15 09:02:09
          116

          Hidden Voice Commands Nicholas Carlini and Pratyush Mishra, University of California, Berkeley; Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields, Georgetown University; David Wagner, University of California,

          Add to Reading List

          Source URL: security.cs.georgetown.edu

          Language: English - Date: 2016-08-10 17:31:34
            117

            Mind your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones Tavish Vaidya Micah Sherr {tavish, msherr}@cs.georgetown.edu Georgetown University, Washington, DC USA

            Add to Reading List

            Source URL: security.cs.georgetown.edu

            Language: English - Date: 2015-08-13 14:22:56
              118Network architecture / Computing / Internet Protocol / Internet architecture / IPv6 / IP addresses / Internet Standards / IPv4 / Router / Transmission Control Protocol / Border Gateway Protocol / IPv6 transition mechanism

              Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy Jakub Czyz∗ , Matthew Luckie† , Mark Allman‡ , and Michael Bailey§ ∗ University of Michigan and QuadMetrics, Inc.; jczyz@

              Add to Reading List

              Source URL: mdbailey.ece.illinois.edu

              Language: English - Date: 2016-03-02 08:24:56
              119

              2013 IEEE Symposium on Security and Privacy SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley

              Add to Reading List

              Source URL: oaklandsok.github.io

              Language: English - Date: 2018-03-14 15:33:55
                120

                White paper submitted to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr

                Add to Reading List

                Source URL: www2.sims.berkeley.edu

                Language: English - Date: 2002-05-19 11:15:10
                  UPDATE