Search results for Security   
Refine your search
Format
Pdf (25)

Release Date
2010-08-18 (5)
5/15/2013 (4)
2005-05-01 (4)
2007-09-18 (3)
2008-06-03 (3)
Show more...

Author
Purandare, Darshan (2)
Mccluskey, Maureen (2)
Aved, Alexander (1)
Balakrishnan, Mohanak... (1)
Bandel, Peter (1)
Show more...

results 1-20 of 79 item(s)  page 1 of 4 : ( <<  1  2  3  4  >> ) :: previous : next
select all : clear all : add to favorites

 Image: Title: Subject: Description:

1. Testing the impact of training with simulated scenarios for information security awareness on virtual Testing the impact of training with simulated scenarios for information security awareness on virtual community of practice members

2. DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL WITH RESTRICTED SEC

3. EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS

4. AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO

5. OPINIONS ON GOVERNMENT SPENDING ON SOCIAL SECURITY: A YEAR AND COHORT ANALYSIS OPINIONS ON GOVERNMENT SPENDING ON SOCIAL SECURITY: A YEAR AND COHORT ANALYSIS

6. DESIGN AND HARDWARE IMPLEMENTATION OF A NOVEL SCRAMBLING SECURITY ALGORITHM FOR ROBUST WIRELESS LOCAL DESIGN AND HARDWARE IMPLEMENTATION OF A NOVEL SCRAMBLING SECURITY ALGORITHM FOR ROBUST WIRELESS LOCAL AREA NETWORKS

7. ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA

8. An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security Systems in Healthcare Organizations

9. Global secure sets of trees and grid-like graphs Global secure sets of trees and grid-like graphs

10. Effects of IT Governance on Information Security Effects of IT Governance on Information Security

11. Networking and security solutions for VANET initial deployment stage Networking and security solutions for VANET initial deployment stage

12. ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY

13. ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY. ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY.

14. SENSOR-BASED COMPUTING TECHNIQUES FOR REAL-TIME TRAFFIC EVACUATION MANAGEMENT SENSOR-BASED COMPUTING TECHNIQUES FOR REAL-TIME TRAFFIC EVACUATION MANAGEMENT

15. When do comprehensive peacekeeping operations succeed? The case of the UN Observer Mission in El Salvador When do comprehensive peacekeeping operations succeed? The case of the UN Observer Mission in El Salvador (ONUSAL) and the UN Verification Mission in Guatemala (MINUGUA)

16. Optimization problem in single period markets Optimization problem in single period markets

17. SECURITY DESIGN THAT ADDRESSES AGENCY CONFLICTS AND INFORMATION ASYMMETRY SECURITY DESIGN THAT ADDRESSES AGENCY CONFLICTS AND INFORMATION ASYMMETRY

18. REGIONAL READINESS FOR INTELLIGENCE INFORMATION SHARING TO SUPPORT HOMELAND SECURITY REGIONAL READINESS FOR INTELLIGENCE INFORMATION SHARING TO SUPPORT HOMELAND SECURITY

19. ANALYSIS AND INTEGRATION OF A DEBRIS MODEL IN THE VIRTUAL RANGE PROJEC ANALYSIS AND INTEGRATION OF A DEBRIS MODEL IN THE VIRTUAL RANGE PROJEC

20. CONNECTIONLESS APPROACH – A LOCALIZED SCHEME TO MOBILE AD HOC NETWORKS CONNECTIONLESS APPROACH – A LOCALIZED SCHEME TO MOBILE AD HOC NETWORKS
select all : clear all : add to favorites

results 1-20 of 79 item(s)  page 1 of 4 : ( <<  1  2  3  4  >> ) :: previous : next
powered by CONTENTdm ® | contact us  ^ to top ^