Index of /rsaconference/europe-2013/


../
README.txt                                         16-Feb-2015 04:13                  80
ads-r01-cryptography-as-a-service.pdf              23-Oct-2013 02:13              818530
ads-r02-is-a-secure-agile-sdlc-program-a-possib..> 23-Oct-2013 02:22             4192068
ads-r07-if-i-want-a-perfect-cyberweapon-i-will-..> 23-Oct-2013 02:24              808619
ads-r08-entropy-random-numbers-and-keys-whats-g..> 23-Oct-2013 02:25             2276987
ads-t07-bug-parades-zombies-and-the-bsimm-a-dec..> 29-Oct-2013 09:58             3334956
ads-w01-top-ten-proactive-software-controls.pdf    23-Oct-2013 02:00             1263841
ads-w08-relax-everybody-html5-is-securer-than-y..> 23-Oct-2013 02:11             1031792
ads-w10-why-does-database-patching-require-a-ph..> 23-Oct-2013 02:12              810260
arch-r01-alternatives-and-enhancements-to-cas-f..> 31-Oct-2013 12:17              984270
arch-r02-preventing-attackers-from-using-verifi..> 23-Oct-2013 02:43             1591555
arch-r07-scalable-authentication.pdf               23-Oct-2013 02:44             1396113
arch-r08-saml-meets-oauth-in-the-cloud.pdf         23-Oct-2013 02:46              627831
arch-t07-battle-scars-and-friendly-fire-war-sto..> 23-Oct-2013 02:26             4059460
arch-w01-old-vulnerabilities-in-new-protocols-h..> 30-Oct-2013 08:52             1733353
arch-w08-considering-cloud-learn-about-current-..> 31-Oct-2013 13:58             3751803
arch-w10-nailing-cloud-security-with-pre-cloud-..> 25-Oct-2013 03:25              496831
grc-r01-control-quotient-adaptive-strategies-fo..> 23-Oct-2013 03:38            15394098
grc-r02-measurement-as-a-key-to-confidence-prov..> 20-Feb-2014 01:36             1325466
grc-r02-supply-chain-assurance-framework.pdf       23-Oct-2013 03:39              390785
grc-r07-overhauling-compliance-frameworks-for-s..> 23-Oct-2013 03:40             3045400
grc-r08-playing-the-game-of-thrones-ensuring-th..> 05-Nov-2013 13:35             7022136
grc-t06-information-stewardship-avoiding-data-b..> 23-Oct-2013 03:21             3463353
grc-t08a-managing-daily-security-operations-wit..> 23-Oct-2013 03:27             6490243
grc-w07-when-worlds-collide-harmonising-governa..> 23-Oct-2013 17:19              264241
grc-w09-turning-the-table-through-federated-inf..> 23-Oct-2013 03:36             3036635
ht-r01-the-era-of-destructive-cyber-attacks-are..> 31-Oct-2013 11:44             3293625
ht-r02-defending-against-low-bandwidth_-asymmet..> 31-Oct-2013 09:59             2478801
ht-r07-lessons-learned-from-a-rigorous-analysis..> 23-Oct-2013 03:17             2719463
ht-r08-how-hackers-are-outsmarting-smart-tvs-an..> 31-Oct-2013 12:51             2321701
ht-t06-dissecting-banking-trojan-carberp-copy1.pdf 29-Oct-2013 09:22             1830723
ht-t08-big-data-for-security-purposes-how-can-i..> 05-Nov-2013 13:46             2923726
ht-w07-hacking-back-as-a-law-enforcement-role.pdf  23-Oct-2013 03:11             4080812
hta-t07-did-you-read-the-news-http-request-hija..> 04-Nov-2013 13:24             5482270
hta-w01-comparative-study-iran-russia-prc-cyber..> 30-Oct-2013 11:28            38137612
hta-w08-concurrent-behaviour-analysis-resilient..> 31-Oct-2013 09:36             2925404
hta-w10-understanding-and-fighting-evasive-malw..> 27-Oct-2013 11:57             2103398
hum-t07-my-personality-your-security-problem.pdf   23-Oct-2013 03:00             3330364
hum-w01-social-media-deception.pdf                 30-Oct-2013 08:29             2436207
hum-w08-security-culture-figuring-out-how-bad-y..> 31-Oct-2013 14:18             1021783
hum-w10-why-can-not-you-get-what-i-m-saying-pen..> 23-Oct-2013 19:01             5445520
mbs-r01-ios-app-analysis-copy1.pdf                 23-Oct-2013 19:00            15770929
mbs-r02-android-malware-exposed-an-in-depth-loo..> 23-Oct-2013 02:59             3743806
mbs-r07-crafting-an-adaptive-mobile-security-po..> 31-Oct-2013 12:36             1632433
mbs-r08-rogue-apps-desktop-malware-a-dangerous-..> 31-Oct-2013 09:48             1159159
mbs-t08-thousands-of-apps-cant-be-wrong-mobile-..> 29-Oct-2013 09:46             3235411
mbs-w07-securing-byod-mitigating-risk-not-forci..> 30-Oct-2013 12:33             1078500
mbs-w09-security-implications-of-nfc-in-authent..> 31-Oct-2013 13:42             1123211
msb-t06-you-are-not-your-iphone-or-are-you.pdf     29-Oct-2013 11:28             1721952
sect-t08-cyber-security-information-exchange.pdf   23-Oct-2013 02:49             9569856
sect-w07-10-it-trends-influencing-the-informati..> 25-Oct-2013 03:09            14473053
sper-r07-network-and-information-security-legis..> 31-Oct-2013 12:04             2505564
sper-r08-security-vs-privacy-the-big-fight.pdf     24-Oct-2013 17:44              396552
sper-w01-raising-awareness-of-information-secur..> 30-Oct-2013 09:45             2074101
spo-t06-microsoft-security-intelligence-report-..> 05-Nov-2013 13:58             4074506
spo-t07-automating-the-20-critical-security-con..> 24-Oct-2013 17:36             2851736
spo-w01-using-big-intelligence-to-defend-agains..> 21-Oct-2013 19:11             6003164
spo-w07-breaking-the-kill-chain-an-early-warnin..> 21-Oct-2013 19:08             1579081
spo-w08-security-debt-and-the-rule-of-72.pdf       25-Oct-2013 18:13              635827
spo-w09-good-guys-vs-bad-guys-using-big-data-to..> 31-Oct-2013 15:04             1698087
spo-w10-evolving-from-breach-prevention-to-brea..> 31-Oct-2013 15:18             5349263