Trojan

Results: 685



#Item
131H.D. / The Penelopiad / Helen of Troy / Eurydice / Homer / Trojan War / Persephone / Odyssey / Ares / Greek mythology / Literature / Orpheus

IDHsec. 12GE), CLTsec. 106D), LITsec. 15G8) Professors: Marsha Bryant (English), & Mary Ann Eaverly (Classics), Spring 2015

Add to Reading List

Source URL: www.english.ufl.edu

Language: English - Date: 2015-01-12 11:38:14
132

AHS TROJAN CROSS COUNTRYCROSS COUNTRY SUMMER CONDITIONING DISTANCE IS FOR THE DARING So You Want to Run Cross Country

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-02-25 14:42:41
    133Computing / Software testing / Hacking / Software bugs / Vulnerability / Penetration test / Trojan horse / Flaw hypothesis methodology / JavaScript / Cyberwarfare / Computer network security / Computer security

    A Taxonomy CARL of Computer E. LANDWEHR,

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:00:37
    134Credit / Mortgage / Banking / Economics / Personal finance / Commercial lender / Commercial mortgage / Mortgage loan / Mortgage law / Financial economics / Finance / Mortgage industry of the United States

    Lender Support Study Enhancing the Commercial Real Estate Lender Consent Process for PACE Transactions by Natalie Trojan, Senior Director, PACENow

    Add to Reading List

    Source URL: usdn.org

    Language: English - Date: 2013-11-12 09:52:05
    135Achilles / Helen of Troy / Agamemnon / Calchas / Paris / Troy / Greek mythology / La belle Hélène / Trojan War

    OFFENBACH LA BELLE HELENE English Version by Donald Pippin ACT ONE The overture stops abruptly ….

    Add to Reading List

    Source URL: www.pocketopera.org

    Language: English - Date: 2015-02-22 09:40:05
    136Spyware / SecurID / Two-factor authentication / Computer security / Password / Trojan horse / Security / Malware / Cryptography

    JANUARYAuthentication Security ‟

    Add to Reading List

    Source URL: www.cryptografx.com

    Language: English - Date: 2015-03-04 12:33:11
    137Tapa Airfield / TaPa / Sports / Association of American Universities / University of Southern California / USC Trojans

    TAPA Trojan Athletic Parents Assocation TAPA is open to all USC parents, grandparents and legal guardians who have a student attending USC

    Add to Reading List

    Source URL: usc-athletics.s3.amazonaws.com

    Language: English - Date: 2013-10-23 16:49:59
    138Physical Unclonable Function / Randomness / Elliptic curve cryptography / Side channel attack / PUF / LEX / Hardware Trojan / Digital rights management / Joint Test Action Group / Cryptography / Advanced Encryption Standard / Trojan horses

    HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

    Add to Reading List

    Source URL: www.engr.uconn.edu

    Language: English - Date: 2010-10-16 10:23:01
    139Security / Hardware Trojan / Physical Unclonable Function / Side channel attack / Computer security / Power analysis / Threat / Cryptography / Cyberwarfare / Computer network security

    ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

    Add to Reading List

    Source URL: www.engr.uconn.edu

    Language: English - Date: 2011-05-27 10:02:27
    140Computer security / Fault injection / Booz Allen Hamilton / Side channel attack / Cyberwarfare / Espionage / Security / Trojan horses / Hardware Trojan

    Microsoft Word - HOST2015_Program_v10.docx

    Add to Reading List

    Source URL: www.engr.uconn.edu

    Language: English - Date: 2015-05-05 13:55:29
    UPDATE