Uploads
Contact
/
Login
Upload
Search Results for 'Application Secure'
Secure Hardware and Blockchain Technologies
myesha-ticknor
Secure Hardware and Blockchain Technologies
sherrill-nordquist
Secure development (for a secure planet)
alexa-scheidler
Contain Yourself: Building Mobile Secure Containers
lindy-dunigan
Tessellation OS: an OS for
lois-ondreau
1 How GlobalPlatform's TEE
stefany-barnette
Framework for Realizing Efficient Secure Computations
calandra-battersby
Services application architecture in SP2013
tatyana-admore
Services application architecture in SP2013
trish-goza
Android Security Through ARM TrustZone Emulation
celsa-spraggs
Changes to the disclosure process-
pasty-toler
Contain Yourself:
celsa-spraggs
Method of providing Secure Network Channel among Secure OSs
calandra-battersby
Framework for Realizing Efficient Secure Computations
cheryl-pisano
Authors:
tawny-fly
Ecole Pour l’Informatique et les Techniques Avancées
yoshiko-marsland
A Logic of Secure Systems and its Application to Trusted Co
tatiana-dople
Simplified, Anywhere, Applications Access
tatyana-admore
OWASP Periodic Table of Vulnerabilities
myesha-ticknor
SOF Tactical Tourniquet
conchita-marotz
Making Custom Financial Apps Secure
celsa-spraggs
ColdFusion Security Review
karlyn-bohler
Application Security: Past, Present and Future
luanne-stotts
A Secure Environment for Untrusted Helper Applications
min-jolicoeur
1
2
3
4
5
6