Security architecture

Results: 5312



#Item
431

Helsinki Plus: Towards a Human Security Architecture for Europe The First Report of the EU-Russia Human Security Study Group To Be Presented to:

Add to Reading List

Source URL: www.lse.ac.uk

Language: English - Date: 2013-04-22 16:21:45
    432

    Design, Architecture & Embedded Software Division Leti is an institute of CEA, a French research-and-technology organization with activities in energy, IT, healthcare, defense and security. By creating innovation and tr

    Add to Reading List

    Source URL: www.leti.fr

    Language: English - Date: 2014-06-12 05:19:12
      433

      Poster - A Distributed Security Architecture for P2PSIP.dvi

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2013-05-17 10:01:48
        434

        TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof UC Berkeley

        Add to Reading List

        Source URL: www.chriskarlof.com

        Language: English - Date: 2012-01-02 15:40:21
          435

          Defence General: Knowledge/ understanding of how to work with: International security and justice architecture (including the UN, regional institutions such as the EU and African Union, and NGOs/civil society) Key par

          Add to Reading List

          Source URL: collections.europarchive.org

          Language: English
            436

            Defence General: Knowledge/ understanding of how to work with: International security and justice architecture (including the UN, regional institutions such as the EU and African Union, and NGOs/civil society) Key par

            Add to Reading List

            Source URL: collections.europarchive.org

            Language: English
              437

              An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley , ,

              Add to Reading List

              Source URL: www.usenix.org

              Language: English
                438

                2014 IEEE Security and Privacy Workshops Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud Aliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori Istituto di Informatica e Tele

                Add to Reading List

                Source URL: www.ieee-security.org

                Language: English - Date: 2014-04-30 03:12:45
                  439

                  Matthew
W.
Pagano
 Computer
Security
Architecture
 Spring
2008
Semester
 Dr.
Masson
/
Dr.
Vasconcelos
 PSEUDORANDOM
NUMBER
GENERATORS
ON
ATMEL
AVR
AT90USB1287
MICROCONTROLLERS


                  Add to Reading List

                  Source URL: hms.isi.jhu.edu

                  Language: English - Date: 2012-02-06 00:41:04
                    440

                    1999 Paper 7 Question 6 Security You have been hired by a company which is bidding to take over the National Lottery when Camelot’s franchise expires, and your responsibility is the security architecture. State the se

                    Add to Reading List

                    Source URL: www.cl.cam.ac.uk

                    - Date: 2014-06-09 10:17:29
                      UPDATE