×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security primitives]
Jason I. Hong January 31, 2006 Usable Privacy and Security Chameleon and Kazaa
216 views
Exploring Security Synergies in Driverless Car and UAS Integrated Modular Architectures (IMAs) Thomas Gaska Lockheed Martin MST Owego and Binghamton University
215 views
Efficient Securing System Using Graphical Captcha
38 views
1 Seminar on “Clean Slate Design for the Internet” Nick McKeown
[email protected]
[email protected]
228 views
15-853Page 1 15-853:Algorithms in the Real World Cryptography 3, 4 and 5
219 views
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang
222 views
15-853Page 1 15-853:Algorithms in the Real World Cryptography 3 and 4
225 views
TinySec : Link Layer Security Architecture for Wireless Sensor Networks
56 views
Sun’s Project JXTA
79 views
Case Study: Using PVS to Analyze Security Protocols
24 views
15-853:Algorithms in the Real World
37 views
Sun’s Project JXTA Technical Overview Presented by Sergei Kovalenko Red Team: Janhavi James A. Davis Fernando D. Diaz
220 views
Next >