Security analysis

Results: 6956



#Item
611

Global Food Security-support Analysis Data @ 30 m (GFSAD30) Project The GFSAD30 project we will Release Cropland Products as: Global Cropland Extent (GCE) ‘GCE’ (Global Cropland Extent) Product / Documentation Review

Add to Reading List

Source URL: e4ftl01.cr.usgs.gov

Language: English
    612

    2011 IEEE Symposium on Security and Privacy HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis Yinqian Zhang University of North Carolina

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2011-04-10 18:07:00
      613

      Side-Channel Analysis of Grøstl and Skein

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2012-06-05 18:18:16
        614

        Market Food Security and Nutrition Analysis Unit - Somalia Monthly Market Data Analysis, August/September 2011

        Add to Reading List

        Source URL: www.fsnau.org

        Language: English - Date: 2011-09-26 09:40:25
          615

          National Human Development Reports and the Human Security Framework: A review of Analysis and Experience By Richard Jolly and Deepayan Basu Ray (Institute of Development Studies, Sussex)

          Add to Reading List

          Source URL: www.bvsde.paho.org

          Language: English - Date: 2006-09-23 00:47:40
            616

            Royal Institute of Technology Dept. of Numerical Analysis and Computer Science Network Application Security Using The Domain Name System

            Add to Reading List

            Source URL: josefsson.org

            Language: English - Date: 2012-09-11 01:50:32
              617

              Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

              Add to Reading List

              Source URL: www.memoryatwork.org

              Language: English - Date: 2010-12-06 08:20:02
                618

                The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Zhiwei Li, Warren He, Devdatta Akhawe, and Dawn Song, University of California, Berkeley https://www.usenix.org/conference/usenixsecu

                Add to Reading List

                Source URL: www.cs.berkeley.edu

                Language: English - Date: 2014-11-05 00:46:44
                  619

                  Information-Theoretic Security Analysis of Physical Uncloneable Functions ˇ P. Tuyls, B. Skori´ c, S. Stallinga, A.H.M. Akkermans, and W. Ophey Philips Research Laboratories, Prof. Holstlaan 4,

                  Add to Reading List

                  Source URL: homepage.tudelft.nl

                  Language: English - Date: 2007-06-06 04:19:06
                    620

                    Analysis of Payment Transaction Security in Mobile Commerce Seema Nambiar, Chang-Tien Lu Department of Computer Science Virginia Polytechnic Institute and State UniversityHaycock Road, Falls Church, VAfsnam

                    Add to Reading List

                    Source URL: europa.nvc.cs.vt.edu

                    Language: English - Date: 2007-03-30 15:36:21
                      UPDATE