×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [security analysis of]
Home >
security analysis of
Security Analysis of Role-based Access Control through Program Verification Anna Lisa Ferrara University of Bristol, UK P. Madhusudan University of Illinois,
213 views
Private Network Communication II (Security Analysis of SSL3.0 and IPsec) IS511.
221 views
MyGrid asset-based security analysis Victor Tan, Luc Moreau University of Southampton Mike Surridge IT Innovation.
213 views
Cracking-Resistant Password Vaults Using Natural Language Encoders Rahul Chatterjee UW-Madison & Cornell University (Fall 2015) Joseph Bonneau Stanford.
213 views
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.
213 views
Policy Analysis for Self-administrated Role-based Access Control Gennaro Parlato U. Southampton, UK Anna Lisa Ferrara P. Madhusudan U. Bristol, UK UIUC,
213 views
Policy Analysis for Self-administrated
47 views
TinySec : Link Layer Security Architecture for Wireless Sensor Networks
53 views
بررسی چالشهای امنیتی در شبکه های موردی وسایل نقلیه
1.584 views