Security paper

Results: 6621



#Item
261

ASIACCS 2013 8th ACM Symposium on Information, Computer and Communications Security 8-10 May 2013, Hangzhou, China Distinguished Paper Award

Add to Reading List

Source URL: www.cnsr.ictas.vt.edu

- Date: 2013-06-24 12:26:21
    262

    Fault-Tolerant Non-interference Extended Version Filippo Del Tedesco, Alejandro Russo, and David Sands Chalmers University of Technology, Sweden Abstract. This paper is about ensuring security in unreliable systems. We

    Add to Reading List

    Source URL: www.cse.chalmers.se

    Language: English - Date: 2014-03-01 20:19:01
      263Computer access control / Computer security / Cryptography / Access control / FIDO Alliance / Authentication / Strong authentication / Multi-factor authentication / Universal 2nd Factor / Fido Solutions / Password / Security token

      Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Regulatory Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PS

      Add to Reading List

      Source URL: fidoalliance.org

      Language: English - Date: 2016-02-05 15:46:07
      264

      White Paper A New Paradigm Shift: Comprehensive Security Beyond the Operating System

      Add to Reading List

      Source URL: mycourses.med.harvard.edu

      Language: English
        265

        Issue Brief No Women, No Peace The Importa nce of Women’s Participation to Achieve Peace and Security A paper submitted to the UN High-Level Panel on Threats, Challenges and Change, upon the invitation of the UN Founda

        Add to Reading List

        Source URL: womenpeacesecurity.org

        Language: English - Date: 2009-09-21 00:58:20
          266

          Bosnia and Herzegovina Civilian Capacities for Peace Operations Emsad Dizdarevic Centre for Security Studies Summary This paper aims to present current situation in Bosnia and Herzegovina related to the civilian

          Add to Reading List

          Source URL: css.ba

          Language: English - Date: 2016-03-29 11:12:37
            267

            CONGO-BRAZZAVILLE The deep end of the Pool Hanlie de Beer and Richard Cornwell Africa Early Warning Programme, Institute for Security Studies Occasional Paper No 41 - September 1999 INTRODUCTION Congo-Brazzaville lies at

            Add to Reading List

            Source URL: www.issafrica.org

            Language: English - Date: 2010-07-14 09:40:07
              268Domain name system / Computing / Internet / Network architecture / DNS spoofing / OpenDNS / Name server / Dynamic DNS / Fast flux / IID / Dan Kaminsky / Botnet

              IID WHITE PAPER Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie Executive summary Strong enterprise security in 2013 requires a

              Add to Reading List

              Source URL: internetidentity.com

              Language: English
              269

              AKAMAI WHITE PAPER ak amai’s [ st at e o f t h e in t e r n e t ] / security The Torte Botnet: A SpamBot Investigation

              Add to Reading List

              Source URL: www.stateoftheinternet.com

              Language: English - Date: 2015-11-02 00:13:55
                270Security / Cyberwarfare / Cryptography / Computer network security / Computer security / Crime prevention / National security / Token / Ghana / Security token

                Bitland Global White Paper Authored by: L. Chris Bates - C.S.O. Bitland Global

                Add to Reading List

                Source URL: www.bitland.world

                Language: English - Date: 2016-03-28 10:17:55
                UPDATE