Security

Results: 374843



#Item
171Theoretical computer science / Quantum information science / Emerging technologies / Physics / Quantum cryptography / Quantum mechanics / Quantum computing / Quantum technology / Quantum information / Quantum network / Pittsburgh Quantum Institute

National Quantum Initiative Act The National Quantum Initiative Act establishes a federal program to accelerate quantum research and development for the United States’ economic and national security. Quantum Informatio

Add to Reading List

Source URL: science.house.gov

Language: English - Date: 2018-06-12 17:38:57
172Genetics / Biology / Epigenetics / DNA / Genomics / Molecular biology / Genetic mapping / DNA methylation / Bisulfite sequencing / Methylation / CpG site / Bayesian tool for methylation analysis

Identifying Personal DNA Methylation Profiles by Genotype Inference Michael Backes∗ , Pascal Berrang∗ , Matthias Bieg† , Roland Eils†‡ , Carl Herrmann†‡ , Mathias Humbert∗ , Irina Lehmann§ ∗ CISPA,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:30
173Economy / Money / Finance / Social programs / Labour law / Types of insurance / Withholding taxes / Insurance / Unemployment benefits / Federal Insurance Contributions Act tax / European Free Trade Association / Health insurance

Federal Department of Home Affairs FDHA Federal Social Insurance Office FSIO International Affairs Social Security for Posted Workers Contracting States, outside EU/EFTA

Add to Reading List

Source URL: www.bsv.admin.ch

Language: English
174Security / Prevention / Computer security / Security breaches / Crime prevention / Cryptography / National security / Security breach notification laws / Vulnerability / Internet privacy / Privacy / Password policy

0760 NETWORK SECURITY POLICY PRIVACY POLICIES Collective Medical Technologies, Inc. Objective This Security Policy (“Policy”) applies to all Services provided by Collective Medical Technologies, Inc. (“CMT”)

Add to Reading List

Source URL: www.collectivemedicaltech.com

Language: English - Date: 2018-03-20 02:31:48
175United States administrative law / Geography of Africa / Government / Africa / 106th United States Congress / African Growth and Opportunity Act / Paperwork Reduction Act / Federal Register / Office of Management and Budget / Zambia

Federal Register / Vol. 66, NoThursday, December 20, Notices 11. Amendments to Chapter XIII OCC proposed and the Commission approved a new Chapter XIII of its rules to govern security futures.9 With the cu

Add to Reading List

Source URL: 34.232.160.87

Language: English - Date: 2002-01-08 15:14:32
176Dimension reduction / Principal component analysis / Anomaly

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 22:38:18
177Cryptographic protocols / Electromagnetism / Garbled circuit / Secure multi-party computation / IP / Theory of computation / NC / Electronic circuit / Applied mathematics / Commitment scheme

CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-03-10 13:39:26
178Cryptography / Stream ciphers / Vigenre cipher / Ciphertext / Cryptanalysis / Caesar cipher

EECS 388 Intro to Computer Security September 16, 2016 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
179Cryptography / Cryptographic protocols / RC4 / Secure communication / Stream cipher / IEEE 802.11 / Transport Layer Security

All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS Mathy Vanhoef and Frank Piessens, KU Leuven USENIX Security 2015 RC4

Add to Reading List

Source URL: www.rc4nomore.com

Language: English - Date: 2018-09-24 16:02:05
UPDATE