The Security Institute

Results: 5633



#Item
191

Performance and Security Improvements for Tor: A Survey Mashael AlSabah, Qatar University and Qatar Computing Research Institute Ian Goldberg, University of Waterloo Tor [Dingledine et alis the most widely used a

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2016-05-19 15:34:47
    192Security sector reform / Geneva Centre for the Democratic Control of Armed Forces / Security / Peace / Politics / Prevention / Geneva Centre for Security Policy / Peacebuilding / Maison de la paix / Graduate Institute of International and Development Studies / Ombudsman / Human security

    DCAF Strategy 2016–DCAF Strategy 2016 – 2019

    Add to Reading List

    Source URL: www.dcaf.ch

    Language: English
    193Data security / Computer security / Security / National Institute of Standards and Technology / Federal Information Security Management Act / Security controls / Key management / Information security / Personally identifiable information / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service

    Draft SP 800-175A, Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-04-05 09:50:54
    194Hacking / Web design / Digital typography / News aggregators / Social engineering / Cross-site scripting / Cross-site request forgery / NoScript / Content Security Policy / JavaScript / Clickjacking / Cascading Style Sheets

    Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2012-08-16 02:39:46
    195

    Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Dennis Hofheinz∗, Jessica Koch†, and Christoph Striecks‡ Karlsruhe Institute of Technology, Germany, {Dennis.Ho

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2016-02-23 08:59:36
      196Majority / Parliamentary procedure / Political terminology / Quorum / Article One of the United States Constitution / Government / Politics / United States / Interagency Security Classification Appeals Panel / Public Interest Declassification Board

      IEEE AUSTRALIA COUNCIL BYLAWS In all instances, the Institute of Electrical and Electronics Engineers (IEEE) Bylaws, Constitution, RAB Operations Manual and IEEE Policy and Procedures will prevail when there is a conflic

      Add to Reading List

      Source URL: ieee-ac.org

      Language: English - Date: 2016-02-19 09:17:27
      197

      Institute for Cyber Security Authorization and Trust in the Cloud Prof. Ravi Sandhu Executive Director and Endowed Chair USECSW

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2013-05-28 03:58:54
        198

        Honeypots and the Enterprise: Intelligence-based Risk Management Institute for Security Technology Studies Dartmouth College Hanover, New Hampshire

        Add to Reading List

        Source URL: www.ists.dartmouth.edu

        Language: English - Date: 2008-09-11 13:38:13
          199

          Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

          Add to Reading List

          Source URL: profsandhu.com

          Language: English - Date: 2013-11-05 17:37:29
            UPDATE