×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security property]
Ppt ch 11
433 views
Conscript Your Friends into Larger Anonymity Sets with JavaScript ACM Workshop on Privacy in the Electronic Society 4 November 2013 Henry Corrigan-Gibbs
216 views
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
214 views
Engineering Cryptographic Applications: Symmetric Encryption
784 views
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Networks
477 views
Cryptography
698 views
The entropic principle: /dev/u?random and NetBSD by Taylor R Campbell
92 views
Vol 01 chapter 11 2015
22 views
Mortgages: nature, creation, source of rights
99 views
Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation" UNIFI-CNR Nicola Nostro, Andrea
215 views
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering
224 views
Bankruptcy Slide
7 views
Next >