×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [notion of security]
Software Technology Research Laboratory, Mobile Agents in Distributed Environments: Principles and Paradigms Kevin Jones
[email protected]
kij
223 views
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
296 views
University of New Hampshire
632 views
Webinar: Cloud Computing - Service and Deployment Models
169 views
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer
216 views
Submission doc.: IEEE 802.11-15/1128r1 September 2015 Dan Harkins, Aruba Networks (an HP company)Slide 1 Opportunistic Wireless Encryption Date: 2015-09-13
218 views
An Identification of the Differences Between a Realist Security Approach and a Human Security Approach to the Issue of Water Security
19 views
Copyright, 1995-2012 1 COMP 3410 – I.T. in Electronic Commerce eSecurity Security of Information and IT Roger Clarke Xamax Consultancy, Canberra Visiting
218 views
Message authentication codes, modes of operation, and indifferentiability
62 views
Key Derivation from Noisy Sources with More Errors Than Entropy Benjamin Fuller Joint work with Ran Canetti, Omer Paneth, and Leonid Reyzin May 5, 2014
217 views
Message authentication codes, modes of operation, and indifferentiability
20 views
Enhancing National Security through Communication
32 views
Next >