Security paper

Results: 6621



#Item
301

Working Paper No. 23 CGIAR Research Program on Climate Change, Agriculture and Food Security (CCAFS) Edited by Philip Thornton and Laura Cramer Working Paper

Add to Reading List

Source URL: cgspace.cgiar.org

Language: English - Date: 2016-01-22 06:59:57
    302Enterprise application integration / ISO/IEC 11179 / United States Department of Justice / United States Department of Homeland Security / Java enterprise platform / National Information Exchange Model / Enterprise service bus / SEARCH /  The National Consortium for Justice Information and Statistics / Service-oriented architecture / OJB / GJXDM / Integration platform

    Open Justice Broker Concept Paper Prepared by: Scott Came, SEARCH December 15, 2010 As anyone knows who has tried to do it: Automating justice information flows and integrating justice systems are complex, difficult

    Add to Reading List

    Source URL: www.ojbc.org

    Language: English - Date: 2015-04-15 14:20:55
    303

    Briefing Paper The Russian Threat to Security in the Baltic Sea Region Kalev Stoicescu In the space of 15 years, under the leadership of President Vladimir Putin, Russia’s relationship with the Western world has made t

    Add to Reading List

    Source URL: www.icds.ee

    Language: English - Date: 2015-10-06 05:01:34
      304

      Summary Introduction Paper-based communication and transaction mechanisms are being replaced by automated transaction mechanisms at a breath-taking pace. Traditional security mechanisms such as photographs, paper-based c

      Add to Reading List

      Source URL: www.credentica.com

      Language: English - Date: 2004-05-24 20:52:50
        305

        HEALTH CARE FOR ALL - WASHINGTON Background Paper 1 The Washington Health Security Trust HBSB 5224 Affordable, High Quality Health Care for ALL Washington Residents

        Add to Reading List

        Source URL: www.healthcareforallwa.org

        Language: English - Date: 2013-02-04 13:24:18
          306Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

          Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

          Add to Reading List

          Source URL: fc15.ifca.ai

          Language: English - Date: 2015-01-11 00:32:58
          307

          Airport Security White Paper by Mark Radford, CEO – Blighter Surveillance Systems Airport Security White Paper

          Add to Reading List

          Source URL: www.liteye.com

          Language: English - Date: 2015-05-22 13:43:29
            308

            WORKING PAPER 1: HOW TO BEGIN SHIFTING ATTENTION TO EMPLOYMENT SECURITY*† 1. Key challenge & overview People in precarious employment have less employment security. Public discourse on employment often focuses on indiv

            Add to Reading List

            Source URL: pepsouwt.files.wordpress.com

            Language: English - Date: 2014-08-28 14:50:20
              309

              NHSMUN 2015 Security Council Update Paper NHSMUN

              Add to Reading List

              Source URL: www.imuna.org

              Language: English - Date: 2015-02-15 19:56:16
                310

                A Survey of Interdependent Security Games Working paper CrySyS Lab Technical Report No. CRYSYS-TRJournal version accepted to ACM Computing Surveys (CSUR) in June 2014 under the title “A Survey of Interdepen

                Add to Reading List

                Source URL: aronlaszka.com

                Language: English - Date: 2014-11-20 15:28:20
                  UPDATE