Security University

Results: 12075



#Item
201

Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems Sibin Mohan Dept. of Computer Science, North Carolina State University, Raleigh, NCAbstract

Add to Reading List

Source URL: www.cs.virginia.edu

- Date: 2008-02-18 18:05:28
    202

    ON THE ROAD Exploring Economic Security Pathways in Indiana By Diana M. Pearce, PhD  •  January 2016 DIRECTOR, CENTER FOR WOMEN’S WELFARE UNIVERSITY OF WASHINGTON SCHOOL OF SOCIAL WORK

    Add to Reading List

    Source URL: www.incap.org

    - Date: 2016-01-12 09:45:30
      203

      Information security policy for teaching, research and business operations at Leiden University 1

      Add to Reading List

      Source URL: media.leidenuniv.nl

      - Date: 2015-03-24 09:15:32
        204

        CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition Ethan M. Rudd and Terrance E. Boult University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {erudd,tboult}@

        Add to Reading List

        Source URL: www.cv-foundation.org

        - Date: 2016-05-30 11:04:05
          205

          Security protocols for Secret Santa Sjouke Mauw, Saˇsa Radomirovi´c, and Peter Ryan University of Luxembourg Facult´e des Sciences, de la Technologie et de la Communication 6, rue Richard Coudenhove-Kalergi L-1359, Lu

          Add to Reading List

          Source URL: satoss.uni.lu

          - Date: 2015-05-07 11:48:52
            206

            New Mexico State University Alamogordo 2014 Annual Security Report

            Add to Reading List

            Source URL: nmsua.edu

            - Date: 2016-09-05 03:38:55
              207

              A Security Protocol Adaptation Layer for the IP-based Internet of Things René Hummen, Tobias Heer, and Klaus Wehrle Communication and Distributed Systems RWTH Aachen University Germany

              Add to Reading List

              Source URL: www.iab.org

              - Date: 2011-03-25 11:03:48
                208

                Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch

                Add to Reading List

                Source URL: ei.rub.de

                - Date: 2013-09-26 05:07:39
                  209

                  Annual Security & Fire Safety Report 2013 2013 Annual Security & Fire Safety Report Table of Contents University Overview .................................................................................................

                  Add to Reading List

                  Source URL: security.jhu.edu

                    210

                    NEW MEXICO STATE UNIVERSITY Annual Security Report October 1, |Page

                    Add to Reading List

                    Source URL: dept-wp.nmsu.edu

                    - Date: 2013-08-30 17:37:22
                      UPDATE