Index of /rsaconference/europe-2013/
../
README.txt 16-Feb-2015 04:13 80
ads-r01-cryptography-as-a-service.pdf 23-Oct-2013 02:13 818530
ads-r02-is-a-secure-agile-sdlc-program-a-possib..> 23-Oct-2013 02:22 4192068
ads-r07-if-i-want-a-perfect-cyberweapon-i-will-..> 23-Oct-2013 02:24 808619
ads-r08-entropy-random-numbers-and-keys-whats-g..> 23-Oct-2013 02:25 2276987
ads-t07-bug-parades-zombies-and-the-bsimm-a-dec..> 29-Oct-2013 09:58 3334956
ads-w01-top-ten-proactive-software-controls.pdf 23-Oct-2013 02:00 1263841
ads-w08-relax-everybody-html5-is-securer-than-y..> 23-Oct-2013 02:11 1031792
ads-w10-why-does-database-patching-require-a-ph..> 23-Oct-2013 02:12 810260
arch-r01-alternatives-and-enhancements-to-cas-f..> 31-Oct-2013 12:17 984270
arch-r02-preventing-attackers-from-using-verifi..> 23-Oct-2013 02:43 1591555
arch-r07-scalable-authentication.pdf 23-Oct-2013 02:44 1396113
arch-r08-saml-meets-oauth-in-the-cloud.pdf 23-Oct-2013 02:46 627831
arch-t07-battle-scars-and-friendly-fire-war-sto..> 23-Oct-2013 02:26 4059460
arch-w01-old-vulnerabilities-in-new-protocols-h..> 30-Oct-2013 08:52 1733353
arch-w08-considering-cloud-learn-about-current-..> 31-Oct-2013 13:58 3751803
arch-w10-nailing-cloud-security-with-pre-cloud-..> 25-Oct-2013 03:25 496831
grc-r01-control-quotient-adaptive-strategies-fo..> 23-Oct-2013 03:38 15394098
grc-r02-measurement-as-a-key-to-confidence-prov..> 20-Feb-2014 01:36 1325466
grc-r02-supply-chain-assurance-framework.pdf 23-Oct-2013 03:39 390785
grc-r07-overhauling-compliance-frameworks-for-s..> 23-Oct-2013 03:40 3045400
grc-r08-playing-the-game-of-thrones-ensuring-th..> 05-Nov-2013 13:35 7022136
grc-t06-information-stewardship-avoiding-data-b..> 23-Oct-2013 03:21 3463353
grc-t08a-managing-daily-security-operations-wit..> 23-Oct-2013 03:27 6490243
grc-w07-when-worlds-collide-harmonising-governa..> 23-Oct-2013 17:19 264241
grc-w09-turning-the-table-through-federated-inf..> 23-Oct-2013 03:36 3036635
ht-r01-the-era-of-destructive-cyber-attacks-are..> 31-Oct-2013 11:44 3293625
ht-r02-defending-against-low-bandwidth_-asymmet..> 31-Oct-2013 09:59 2478801
ht-r07-lessons-learned-from-a-rigorous-analysis..> 23-Oct-2013 03:17 2719463
ht-r08-how-hackers-are-outsmarting-smart-tvs-an..> 31-Oct-2013 12:51 2321701
ht-t06-dissecting-banking-trojan-carberp-copy1.pdf 29-Oct-2013 09:22 1830723
ht-t08-big-data-for-security-purposes-how-can-i..> 05-Nov-2013 13:46 2923726
ht-w07-hacking-back-as-a-law-enforcement-role.pdf 23-Oct-2013 03:11 4080812
hta-t07-did-you-read-the-news-http-request-hija..> 04-Nov-2013 13:24 5482270
hta-w01-comparative-study-iran-russia-prc-cyber..> 30-Oct-2013 11:28 38137612
hta-w08-concurrent-behaviour-analysis-resilient..> 31-Oct-2013 09:36 2925404
hta-w10-understanding-and-fighting-evasive-malw..> 27-Oct-2013 11:57 2103398
hum-t07-my-personality-your-security-problem.pdf 23-Oct-2013 03:00 3330364
hum-w01-social-media-deception.pdf 30-Oct-2013 08:29 2436207
hum-w08-security-culture-figuring-out-how-bad-y..> 31-Oct-2013 14:18 1021783
hum-w10-why-can-not-you-get-what-i-m-saying-pen..> 23-Oct-2013 19:01 5445520
mbs-r01-ios-app-analysis-copy1.pdf 23-Oct-2013 19:00 15770929
mbs-r02-android-malware-exposed-an-in-depth-loo..> 23-Oct-2013 02:59 3743806
mbs-r07-crafting-an-adaptive-mobile-security-po..> 31-Oct-2013 12:36 1632433
mbs-r08-rogue-apps-desktop-malware-a-dangerous-..> 31-Oct-2013 09:48 1159159
mbs-t08-thousands-of-apps-cant-be-wrong-mobile-..> 29-Oct-2013 09:46 3235411
mbs-w07-securing-byod-mitigating-risk-not-forci..> 30-Oct-2013 12:33 1078500
mbs-w09-security-implications-of-nfc-in-authent..> 31-Oct-2013 13:42 1123211
msb-t06-you-are-not-your-iphone-or-are-you.pdf 29-Oct-2013 11:28 1721952
sect-t08-cyber-security-information-exchange.pdf 23-Oct-2013 02:49 9569856
sect-w07-10-it-trends-influencing-the-informati..> 25-Oct-2013 03:09 14473053
sper-r07-network-and-information-security-legis..> 31-Oct-2013 12:04 2505564
sper-r08-security-vs-privacy-the-big-fight.pdf 24-Oct-2013 17:44 396552
sper-w01-raising-awareness-of-information-secur..> 30-Oct-2013 09:45 2074101
spo-t06-microsoft-security-intelligence-report-..> 05-Nov-2013 13:58 4074506
spo-t07-automating-the-20-critical-security-con..> 24-Oct-2013 17:36 2851736
spo-w01-using-big-intelligence-to-defend-agains..> 21-Oct-2013 19:11 6003164
spo-w07-breaking-the-kill-chain-an-early-warnin..> 21-Oct-2013 19:08 1579081
spo-w08-security-debt-and-the-rule-of-72.pdf 25-Oct-2013 18:13 635827
spo-w09-good-guys-vs-bad-guys-using-big-data-to..> 31-Oct-2013 15:04 1698087
spo-w10-evolving-from-breach-prevention-to-brea..> 31-Oct-2013 15:18 5349263