×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [security of]
Home >
security of
Submarine and Autonomous Vessel Proliferation: Implications for Future Strategic Stability at Sea
88 views
Summary of Results Study Period 2005-2008 ITU-T Study Group 16 Multimedia Terminals, Systems and Applications Mr Pierre-André Probst Chairman, SG 16.
212 views
LOGO Security Issues in Wireless Sensor Networks (WSNs) Shayan Zamani & Mojtaba Jafari Mazanadaran University of Science and Technology, Distributed Systems.
216 views
Proud business partners of:: IBIS Management Associates Inc. Service Bureau A new IBIS service provided in partnership with bb&p of Zurich.
212 views
1 Building A Trustworthy, Secure, And Privacy Preserving Network Bharat Bhargava CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
215 views
Graduate School 101 ESP Seminar, September 19, 2005 Dr. N. K. Anand Dwight Look College of Engineering Assistant Dean for Graduate Programs Texas A&M University.
220 views
1 ESAS 2004 New Research Challenges for the Security of Ad Hoc and Sensor Networks Jean-Pierre Hubaux EPFL.
213 views
Customs-Trade Partnership Against Terrorism Working with Business and the Trade Community.
216 views
Having Access Pays ® Assurant Health Access SM For agent use only Not for use in AZ.
218 views
A Design of Trusted Operating System Based on Linux BY LI HONGJUAN, LANYUQING The presenter Rusul J. ALSaedi Spring 2015 CS 69995- Dr. Rothstein.
212 views
ENERGY REGULATORY AND MARKET DEVELOPMENT FORUM November 4, 2010 The Honorable Philip D. Moeller Commissioner Federal Energy Regulatory Commission “ENERGY.
212 views
Building A Trustworthy, Secure, And Privacy Preserving Network
23 views
Next >