Security analysis

Results: 6956



#Item
111

Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm Abstract. The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest

Add to Reading List

Source URL: perso.ens-lyon.fr

- Date: 2009-10-16 07:35:09
    112

    Microsoft Word - ChappellU-Sample 5-Day Course Outline - Network Traffic and Security Analysis - SKU5DS.docx

    Add to Reading List

    Source URL: www.chappellu.com

    - Date: 2012-07-03 17:10:07
      113

      SAMUDRA Monograph NETS FOR SOCIAL SAFETY AN ANALYSIS OF THE GROWTH AND CHANGING COMPOSITION OF SOCIAL SECURITY PROGRAMMES IN THE FISHERIES SECTOR OF KERALA STATE, INDIA

      Add to Reading List

      Source URL: indianfisheries.icsf.net

      - Date: 2012-04-16 01:25:15
        114

        Blade Risk Analyzer Threat Risk Analysis Platform: Assessing the Security Posture of your System In the context of cyber systems both attackers and defenders favor automated code analysis tools (dynamic and/or static) fo

        Add to Reading List

        Source URL: www.kdmanalytics.com

        - Date: 2015-02-04 13:27:13
          115

          Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

          Add to Reading List

          Source URL: www.nominet.uk

          - Date: 2015-10-06 11:03:26
            116

            Security analysis of OpenID, followed by a reference implementation of an nPA-based OpenID provider Sebastian Feld . Norbert Pohlmann Institute for Internet-Security Gelsenkirchen University of Applied Sciences

            Add to Reading List

            Source URL: norbert-pohlmann.com

            - Date: 2015-10-20 13:21:52
              117

              Finding Security Vulnerabilities in Java Applications with Static Analysis V. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu

              Add to Reading List

              Source URL: suif.stanford.edu

              - Date: 2005-07-19 02:30:55
                118

                1 University of New Mexico University Advisement and Enrichment Center, Suite 180 MSC06 3680 Albuquerque, NMNATIONAL SECURITY AND STRATEGIC ANALYSIS COMPLETION FORM for

                Add to Reading List

                Source URL: nssp.unm.edu

                - Date: 2016-03-30 15:25:53
                  119

                  Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

                  Add to Reading List

                  Source URL: www.andrew.cmu.edu

                  - Date: 2016-08-21 11:38:22
                    120Economy / Finance / Money / Financial markets / Close Brothers Group / Financial services / Leifheit / Financial ratio / Security analysis / Securities research / Security / Short

                    Leifheit AG Recommendation: Risk: Price Target:

                    Add to Reading List

                    Source URL: ir.leifheit-group.com

                    Language: English - Date: 2014-08-28 10:26:00
                    UPDATE