Security analysis

Results: 6956



#Item
381

Implementation based security analysis of the electronic passport

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:20:58
    382

    Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency Ran Canetti? IBM Research Abstract. A security property of a protocol is composable if it remains

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2008-11-05 15:38:29
      383Military units and formations of NATO / Allied Maritime Command / Marcom / Allied Command Transformation / Supreme Headquarters Allied Powers Europe / Joint Analysis and Lessons Learned Centre / NATO / International Security Assistance Force / Joint Task Force / Supreme Allied Commander

      COMMAND AND CONTROL OF NATO MARITIME OPERATIONS Report Published on 06 June 2014 PROJECT FACTSHEET

      Add to Reading List

      Source URL: www.jallc.nato.int

      Language: English - Date: 2015-10-02 10:23:57
      384Software / Computing / Smartphones / System software / Android / Lock screen / Mobile app / HTC Dream / Rooting / Mobile device management / Google Play / HTC One

      Security Analysis of Consumer-Grade Anti-Theft Solutions Provided by Android Mobile Anti-Virus Apps Laurent Simon University of Cambridge

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-05-20 23:58:57
      385

      Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Terrence August and Tunay I. Tunca Graduate School of Business, Stanford University Stanford, CA, 94305

      Add to Reading List

      Source URL: ebusiness.mit.edu

      Language: English - Date: 2006-09-09 12:13:56
        386

        TESTIMONY OF DR. GAL LUFT EXECUTIVE DIRECTOR, INSTITUTE FOR THE ANALYSIS OF GLOBAL SECURITY (IAGS) COMMITTEE ON SCIENCE UNITED STATES HOUSE OF REPRESENTATIVES FEBRUARY 9, 2005

        Add to Reading List

        Source URL: www.iags.org

        Language: English - Date: 2006-04-26 09:01:23
          387Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

          Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

          Add to Reading List

          Source URL: aaspring.com

          Language: English - Date: 2015-01-16 19:16:47
          388

          Analysis of the IBM CCA Security API Protocols in Maude-NPA Antonio Gonz´alez-Burgue˜ no1 Sonia Santiago1 1 Santiago Escobar

          Add to Reading List

          Source URL: ssr2015.com

          Language: English - Date: 2015-06-22 06:35:56
            389Economy / Finance / Money / Corporate finance / Stock market / Convertible bond / Stock / Initial public offering / SAFE / Valuation / Fundamental analysis / Security

            SAFE PRIMER A SAFE is a Simple Agreement for Future Equity. An investor makes a cash investment in a company, but gets company equity at a later date, in connection with a specific event. A SAFE is not a debt instrum

            Add to Reading List

            Source URL: www.pitchlandia.com

            Language: English - Date: 2014-05-21 11:11:04
            390

            Insider Behavior: An Analysis of Decision under Risk Fariborz Farahmand and Eugene H. Spafford Center for Education and Research in Information Assurance and Security Purdue University, West Lafayette, Indiana, USA {far

            Add to Reading List

            Source URL: ceur-ws.org

            Language: English - Date: 2009-06-12 06:30:38
              UPDATE