Security University

Results: 12075



#Item
271

are prohibited by the University. Residents must properly sign in their guest(s) with Security, and guests must leave a form of picture identification with Security during their stay. Residents are responsible for and sh

Add to Reading List

Source URL: pages.jh.edu

- Date: 2015-02-20 14:18:00
    272

    On the Security of One-Witness Blind Signature Schemes Foteini Baldimtsi and Anna Lysyanskaya foteini, Computer Science Department, Brown University Abstract. Blind signatures have proved an essential b

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2013-05-21 23:15:07
      273

      FLINDERS UNIVERSITY 2016 PARKING “Expiation Notices” All Parking Inspectors and Security Officers regularly patrol the University campus and Mark Oliphant Building (MOB) and issue Expiation Notices to vehicles found

      Add to Reading List

      Source URL: www.flinders.edu.au

      - Date: 2016-01-05 17:28:33
        274

        Welcome to ISSE 2013 Norbert Pohlmann Chairman: IT security association TeleTrusT Professor: Westphalian University of Applied Sciences Director: Institute for Internet Security - if(is)

        Add to Reading List

        Source URL: norbert-pohlmann.com

        - Date: 2015-12-10 10:13:37
          275

          Quantum cryptography: a practical information security perspective∗ Kenneth G. Paterson, Fred Piper and R¨ udiger Schack Department of Mathematics, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2009-08-11 10:17:38
            276

            Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery M. Angela Sasse Department of Computer Science University College London London, WC1E 6BT, UK

            Add to Reading List

            Source URL: www.andrewpatrick.ca

            - Date: 2003-02-05 13:14:10
              277

              CHICAGO STATE UNIVERSITY CAMPUS SECURITY AND FIRE REPORT 2015 This information is provided in compliance with federal law, known as the Clery Act, and the Illinois Campus Security Enhancement Act.

              Add to Reading List

              Source URL: csu.edu

              - Date: 2015-09-29 16:38:06
                278

                Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

                Add to Reading List

                Source URL: security.cs.georgetown.edu

                - Date: 2016-07-13 03:02:48
                  279

                  San José State University Important Link Information Security Standards - Minimum requirements to implement the Information Security Program. Vulnerability Assessment and Management

                  Add to Reading List

                  Source URL: its.sjsu.edu

                  - Date: 2016-01-21 20:38:03
                    280

                    Algebraic Algorithms for LWE Martin R. Albrecht1 , Carlos Cid1 , Jean-Charles Faug`ere2 , and Ludovic Perret2 1 Information Security Group Royal Holloway, University of London

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-02-26 10:18:21
                      UPDATE