Parent directory/ | - | - |
60 years of scientific research in cryptography - a reflection.mp4 | 64.9 MiB | 2021 May 16 06:27 |
A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems.mp4 | 43.0 MiB | 2021 May 16 06:27 |
Applications of Biometric Technologies.mp4 | 40.6 MiB | 2021 May 16 06:27 |
Assured Processing through Obfuscation.mp4 | 52.9 MiB | 2021 May 16 06:27 |
Data in the Cloud - Authentication Without Leaking.mp4 | 51.4 MiB | 2021 May 16 06:27 |
Detecting Coordinated Attacks with Traffic Analysis.mp4 | 56.0 MiB | 2021 May 16 06:27 |
Detecting Insider Theft of Trade Secrets.mp4 | 42.9 MiB | 2021 May 16 06:27 |
Detection and protection from denial of service attacks in grids by accountab..mp4 | 45.0 MiB | 2021 May 16 06:27 |
Dissecting Digital Data - Context and Meaning through Analytics.mp4 | 48.3 MiB | 2021 May 16 06:27 |
Everything I Needed to Know about Security, I Learned in 1974.mp4 | 50.6 MiB | 2021 May 16 06:27 |
Fast Regular Expression Matching using Small TCAMs for Network Intrusion Dete..mp4 | 54.5 MiB | 2021 May 16 06:27 |
Global Study of Web 2.0 Use in Organizations.mp4 | 48.6 MiB | 2021 May 16 06:27 |
Making of the CWE Top-25, 2010 Edition.mp4 | 45.6 MiB | 2021 May 16 06:27 |
Nudging the Digital Pirate - Behavioral Issues in the Piracy Context.mp4 | 48.3 MiB | 2021 May 16 06:27 |
Ontological Semantic Technology for Detecting Insider Threat and Socia..mp4 | 48.5 MiB | 2021 May 16 06:27 |
Provenance-based Data Trustworthiness Assessment in Data Streams.mp4 | 36.6 MiB | 2021 May 16 06:27 |
Ribbons, A Partially-Shared Memory Programming Model.mp4 | 40.9 MiB | 2021 May 16 06:27 |
Rootkits.mp4 | 61.0 MiB | 2021 May 16 06:27 |
Secure Network Coding for Wireless Mesh Networks.mp4 | 51.2 MiB | 2021 May 16 06:27 |
Security Applications for Physically Unclonable Functions.mp4 | 52.7 MiB | 2021 May 16 06:27 |
Security of JavaScript in a Browser Environment.mp4 | 47.3 MiB | 2021 May 16 06:27 |
Security of Mobile Ad Hoc Networks (MANETs).mp4 | 52.8 MiB | 2021 May 16 06:27 |
Side Channel Threats in the Software-as-a-Service Era - Challenges and Respons..mp4 | 61.1 MiB | 2021 May 16 06:27 |
Tackling System-Wide Integrity.mp4 | 60.9 MiB | 2021 May 16 06:27 |
The role of System Security Engineering in the engineering lifecycle.mp4 | 59.2 MiB | 2021 May 16 06:27 |
The role of automata theory in software verification.mp4 | 57.6 MiB | 2021 May 16 06:27 |
Thinking Outside the Box.mp4 | 40.1 MiB | 2021 May 16 06:27 |
Trust and Protection in the Illinois Browser Operating System.mp4 | 50.1 MiB | 2021 May 16 06:27 |