Leiden University Student Repository

Search results

(21 - 40 of 63)

Pages

Essence of Encryption: A case study of the nascence of the Dutch Government position on encryption
Security Risk Assessment of LoRaWan
Reports, Rewards, and Recriminations A Critical Look At The Practice Of Responsible Disclosure Of Vulnerabilities
SDN South-bound Interface Attack Mitigation
Algorithmic Transparency
Weapons security comply or explain
A Process Model for Phishing Prevention
Evaluating server-side internet proxy detection methods
A generic approach for detecting security anomalies in ISP infrastructures
Cyber Security Due Diligence
How to bring HTTPS to the masses? Measuring issuance in the first year of Let's Encrypt
Multi-stakeholder roadmap for implementing consumer vulnerability management.
The Internet of Things: a privacy label for IoT products in a consumer market
Caring for Security: an analysis of the security of eHealth services of Dutch General Practitioners
Dealing with uncertainty: cybersecurity risk assessment approaches.
The influence of law & regulations on the process of digital transformation at banks in the Netherlands
Multi actor roadmap to improve cyber security of consumer used connected cars

Pages