×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [notion of security]
Software Technology Research Laboratory, Mobile Agents in Distributed Environments: Principles and Paradigms Kevin Jones
[email protected]
kij
223 views
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
299 views
University of New Hampshire
633 views
Webinar: Cloud Computing - Service and Deployment Models
171 views
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer
219 views
Submission doc.: IEEE 802.11-15/1128r1 September 2015 Dan Harkins, Aruba Networks (an HP company)Slide 1 Opportunistic Wireless Encryption Date: 2015-09-13
219 views
An Identification of the Differences Between a Realist Security Approach and a Human Security Approach to the Issue of Water Security
20 views
Copyright, 1995-2012 1 COMP 3410 – I.T. in Electronic Commerce eSecurity Security of Information and IT Roger Clarke Xamax Consultancy, Canberra Visiting
218 views
Message authentication codes, modes of operation, and indifferentiability
72 views
Key Derivation from Noisy Sources with More Errors Than Entropy Benjamin Fuller Joint work with Ran Canetti, Omer Paneth, and Leonid Reyzin May 5, 2014
218 views
Enhancing National Security through Communication
34 views
Novel Methods of Augmenting High Performance Processors with Security Hardware
40 views
Next >