×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [notion of security]
Documents
Software Technology Research Laboratory, Mobile Agents in Distributed Environments: Principles and Paradigms Kevin Jones
[email protected]
kij
225 views
Technology
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
299 views
Business
University of New Hampshire
633 views
Education
Webinar: Cloud Computing - Service and Deployment Models
172 views
Documents
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer
219 views
Documents
Submission doc.: IEEE 802.11-15/1128r1 September 2015 Dan Harkins, Aruba Networks (an HP company)Slide 1 Opportunistic Wireless Encryption Date: 2015-09-13
219 views
Documents
An Identification of the Differences Between a Realist Security Approach and a Human Security Approach to the Issue of Water Security
20 views
Documents
Copyright, 1995-2012 1 COMP 3410 – I.T. in Electronic Commerce eSecurity Security of Information and IT Roger Clarke Xamax Consultancy, Canberra Visiting
218 views
Documents
Message authentication codes, modes of operation, and indifferentiability
73 views
Documents
Key Derivation from Noisy Sources with More Errors Than Entropy Benjamin Fuller Joint work with Ran Canetti, Omer Paneth, and Leonid Reyzin May 5, 2014
218 views
Documents
Enhancing National Security through Communication
36 views
Documents
Novel Methods of Augmenting High Performance Processors with Security Hardware
40 views
Next >