Uploads
Contact
/
Login
Upload
Search Results for 'Secure Privacy'
Engineering privacy-friendly computations
kittie-lecroy
Identities Exposed How Design Flaws in Authentication Solutions May Compromise Your Privacy
olivia-moreira
The Home & Privacy
mitsue-stanley
Privacy 2.3
celsa-spraggs
Library Patron Privacy in Jeopardy
kittie-lecroy
Microsoft Supplier Privacy & Security 101
tawny-fly
Differential Privacy on Linked Data: Theory and Implementat
stefany-barnette
Backdoors & Secure Coding
aaron
Data Mining And Privacy Protection
pasty-toler
Health Information Privacy and Security
pamella-moone
Privacy for Ubiquitous Computing
mitsue-stanley
Privacy, Data Protection & Security
sherrill-nordquist
Invasion of Privacy, Libel, and Copyright Test
olivia-moreira
Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems
alexa-scheidler
21st WATCH: Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy
lindy-dunigan
Introduction to Computer Security: Terminology, Security Po
lindy-dunigan
A Logic of Secure Systems with Tunable Adversary Models
faustina-dinatale
Yukon School Councils and Privacy
kittie-lecroy
Checklist for reviewing Privacy, Confidentiality
cheryl-pisano
Odds and ends
faustina-dinatale
Odds and ends Key Derivation
jane-oiler
Using block ciphers Review: PRPs and PRFs
liane-varnes
Using block ciphers Review: PRPs and PRFs
tatiana-dople
Secure Mission Critical System Design for Open
alexa-scheidler
3
4
5
6
7
8
9
10
11
12
13