首页
知识
文库
登录
|
注册
文库首页
最近浏览
全部分类
免费专区
PPT模板
订单查询
问题反馈
文库协议
关注CIO之家公众号
共查询到包含【信】的及关联的文档共3340个
Nanotechnology Behavior and Supply Chains Managing Risk at a Platform Level
Maturing Cyber Risk Management Practices Framework and Next Steps
SaaS企业如何远离删库跑路
徐工信息智能工厂方案
SoK A Consensus Taxonomy in the Blockchain Era
Universally Composable Accumulators
Universal Forgery Attack against GCM RUP
Traceable Ring Signatures with Post quantum Security
Traceable Ring Signatures with Post quantum Security
Ticket Mediated Password Strengthening
T10 Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Post Quantum Provably Secure Authentication and MAC from Mersenne Primes
My Gadget Just Cares For Me How NINA Can Prove Security Against Combined Attacks
Minimal Assumptions for Fiat Shamir type Signatures and Advances in Garbled RAM Secure Computation
Minimal Assumptions for Fiat Shamir type Signatures and Advances in Garbled RAM Secure Computation
Improved Secure Integer Comparison via Homomorphic Encryption
Improved Secure Integer Comparison via Homomorphic Encryption
Generic Attack on Iterated Tweakable FX Constructions
Fasterhomomorphicencryption is not enough improved heuristic for multiplicative depth minimization o
Efficient FPGA Implementations of LowMC and Picnic
Consensus from Signatures of Work
Better Bootstrapping for Approximate Homomorphic Encryption
A Non Interactive Shuffle Argument With Low Trust
Cut and Choose for Garbled RAM
Peel Back the Layers of Your Enterprise and Make You Adversaries Cry
Open Source Tooling for Threat Analysis and Attack Surface Management
Open Source Promise Perils and the Path Ahead
Abaddon the Red Team Angel
Trust Model Recommendations and Best Practices for CSPs
Intelligent Threat Intel LEAD
Product Security Meets Human Life Inoculating Medical Devices
Beyond the Ballot Box Securing Americas Supporting Election Technology
Aviation Cybersecurity Technology and Teamwork
某汽车公司智能制造信息化项目技术方案
The Emerging Role of the CPSO
Test and Learn Securing Connected Products and Services
Secure Your Code from Open Source Vulnerabilities
SDLC and 62443 Build it in dont bolt it on
Safety Implications of Medical Device Cybersecurity
Million Findings in One Year Fresh Look at the State of Software Security
Integrating Our DevSecOps Product Pipeline with Software Security Standards
Im Still Standing Says Each Cyber
Humanizing Privacy with Power of User Experience UX
A Mapping of GDPR to Common Feature
Youll Be Shocked When You See These 10 Tips fromFormerIndustryAnalysts
Psybersecurity Mental Health Impact of Cyberattacks
No CISSP No Problem Growing the Cyber Talent Pool
Next Steps for the Cybe Moonshot
Imagining the Future of Security
First Do No Harm
New Paradigms for the Next Era of Security
数据标准管理实践白皮书
Which Developers and Teams Are More Likely to Write Vulnerable Software
How to Harness Dev and Their Native Tools to Accelerate DevSecOps
How to GRC Your DevOps
DevSecOps State of the Union
Compromising Kubernetes Cluster by Exploiting RBAC Permissions
Case Files from 20 Years of Business Logic Flaws
某银行数据脱敏项目实施方案
深信服桌面云方案建议书
1
...
31
32
33
34
35
36
37
38
39
40
...
56
转到
页