×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [security properties]
Home >
security properties
Automating Enterprise IT Management
763 views
Lect19
193 views
Protecting Xen hypercalls
1.773 views
1 Security and the Cloud: Cloud Trust Brokers Ravi Ganesan* Founder, SafeMashups +1.415.680.5746
[email protected]
@safemashups.com
[email protected]
@findravi.com.
221 views
GT4 WS Core Tutorial Sam Meder {
[email protected]
} Jarek Gawor {
[email protected]
} 6/11/04.
221 views
SAML basics A technical introduction to the Security Assertion Markup Language Eve Maler XML Standards Architect XML Technology Center Sun Microsystems,
218 views
Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.
221 views
Types and Programming Languages Lecture 1 Simon Gay Department of Computing Science University of Glasgow 2006/07.
215 views
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
[email protected]
esvbb.
216 views
Quantum Cryptography Nick Papanikolaou. Quantum Cryptography 2 Introduction Quantum cryptography is the single most successful application of Quantum.
226 views
Quid-Pro-Quo-tocols Strengthening Semi-Honest Protocols with Dual Execution Yan Huang 1, Jonathan Katz 2, David Evans 1 1. University of Virginia 2. University.
212 views
Finding Collisions in Interactive Protocols A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments Iftach Haitner, Jonathan Hoch,
218 views
< Previous
Next >