Security paper

Results: 6621



#Item
211Fiscal policy / United States fiscal cliff / Presidency of Barack Obama / United States federal budget / Social Security debate in the United States / Baseline / Douglas Elmendorf / Congressional Budget Office / Government budget balance / Fiscal policy of the United States / Social Security Trust Fund / Deficit reduction in the United States

NBER WORKING PAPER SERIES FISCAL POLICY AND SOCIAL SECURITY POLICY DURING THE 1990s Douglas W. Elmendorf Jeffrey B. Liebman David W. Wilcox

Add to Reading List

Source URL: www.nber.org

Language: English - Date: 2001-09-18 16:26:52
212Theoretical computer science / Logic in computer science / Formal methods / Computer security / ACL2 / Lisp / Formal verification / SPARK / Domain-specific language / Pointer / Information security / Programming language

Microsoft Word - LAW-Paper.doc

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
213

White Paper Smart Security Market Segmentation April 2008 Disclaimer

Add to Reading List

Source URL: www.eurosmart.com

Language: English - Date: 2015-10-12 03:48:57
    214Economy / Records management technology / Taxation in the United States / Security / Internal Revenue Service / Insurance / Paper shredder / Invoice

    Astrophysical Research Consortium Document Retention and Destruction Policy This policy covers all records and documents, regardless of physical form or characteristics, which have been created or received by the Astroph

    Add to Reading List

    Source URL: arc.apo.nmsu.edu

    Language: English - Date: 2014-02-05 14:42:05
    215

    MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced ­Symbolic Analysis Ruowen Wang, Peng Ning, Tao Xie, and Quan Chen, North Carolina State University This paper is included in the Proceed

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2013-09-28 11:40:36
      216Cryptography / Public-key cryptography / Cryptocurrencies / Key management / Bitcoin / Transport Layer Security / Blockchain / X.509 / Key / Ethereum / Man-in-the-middle attack / Unique key

      Decentralized Public Key Infrastructure A White Paper from Rebooting the Web of Trust by (alphabetical by last name) Christopher Allen, Arthur Brock, Vitalik Buterin, Jon Callas, Duke Dorje, Christian Lundkvist, Pavel

      Add to Reading List

      Source URL: www.weboftrust.info

      Language: English - Date: 2016-06-08 16:57:37
      217

      A Look Back at “Security Problems in the TCP/IP Protocol Suite” Steven M. Bellovin AT&T Labs—Research Abstract About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol s

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:06
        218

        Random Feistel Schemes: security in m  23n/4 for ≥ 6 rounds Jacques Patarin Abstract This paper is a continuation of the work initiated in [2] by M. Luby and

        Add to Reading List

        Source URL: www.prism.uvsq.fr

        Language: English - Date: 2011-01-18 17:28:07
          219

          European Network and Information Security Agency ENISA Position paper Eurosmart, the Brussels based smart card industry association, welcomes the European Commission Proposal to create the European Network and Informatio

          Add to Reading List

          Source URL: www.eurosmart.com

          Language: English - Date: 2015-10-12 03:33:23
            220

            Architecting for HIPAA Security and Compliance on Amazon Web Services (Please consult http://aws.amazon.com/compliance/aws-whitepapers/ for the latest version of this paper)

            Add to Reading List

            Source URL: d0.awsstatic.com

            Language: English - Date: 2015-12-29 11:19:01
              UPDATE