Security paper

Results: 6621



#Item
311

Solution Paper Virtualization security solutions provide a competitive advantage to service providers – IaaS, PaaS and SaaS

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2015-09-28 12:56:04
    312

    White Paper Cloud Security Cloud Security Trust Cisco to Protect Your Data

    Add to Reading List

    Source URL: www.cisco.com

    Language: English
      313

      The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs Georg T. Becker Horst Görtz Institute for IT-Security, Ruhr Universität Bochum, Germany Abstract. In this paper we demonstrate the first real-

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2015-06-17 16:30:38
        314

        Jekyll on iOS: When Benign Apps Become Evil Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee, Georgia Institute of Technology This paper is included in the Proceedings of the 22nd USENIX Security Symposium.

        Add to Reading List

        Source URL: wenke.gtisc.gatech.edu

        Language: English - Date: 2013-09-30 15:25:17
          315

          THE DARK SIDE OF SECURITY BY OBSCURITY and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime anonymous submission position paper

          Add to Reading List

          Source URL: www.proxmark.org

          Language: English - Date: 2009-03-20 20:20:17
            316

            Xerox DocuShare Security Features ® Security White Paper

            Add to Reading List

            Source URL: docushare.xerox.com

            Language: English - Date: 2015-10-15 18:25:37
              317

              Security with Privacy—Opportunities and Challenges: Panel Position Paper

              Add to Reading List

              Source URL: www.cs.purdue.edu

              Language: English - Date: 2014-07-30 17:38:04
                318

                White Paper BOSTON MARATHON SECURITY WINS

                Add to Reading List

                Source URL: www.trellisware.com

                Language: English
                  319

                  Position Papers Tunisia’s Security Crisis: The Challenge Of Restoring Control This paper was originally written in Arabic by: Al Jazeera Center for Studies

                  Add to Reading List

                  Source URL: studies.aljazeera.net

                  Language: English - Date: 2015-07-27 06:19:02
                    320

                    A Randomized High-Security Cipher Combining Deniability with Pencil-and-Paper Decryption Grant D. Schultz Abstract: With key logging trojans and other malware in the wild, and operating systems being too complex to prote

                    Add to Reading List

                    Source URL: cryptome.org

                    Language: English - Date: 2015-09-04 06:14:52
                      UPDATE