Cryptographic software

Results: 2705



#Item
11Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
12Developing and Testing Web APIs From a curl one-liner to a MooseX::App German Perl Workshop 2015, Dresden/Germany Daniel Böhmer Freelance Software Developer, Perl since 2010

Developing and Testing Web APIs From a curl one-liner to a MooseX::App German Perl Workshop 2015, Dresden/Germany Daniel Böhmer Freelance Software Developer, Perl since 2010

Add to Reading List

Source URL: www.daniel-boehmer.de

Language: English - Date: 2015-05-07 04:01:29
13FreeIPA Training Series  SSH Public Keys in FreeIPA Jan Cholasta

FreeIPA Training Series SSH Public Keys in FreeIPA Jan Cholasta

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:15:16
14L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2009-09-30 17:02:37
15Central Connecticut State University  Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Add to Reading List

Source URL: library.ccsu.edu

Language: English - Date: 2010-07-26 11:08:41
16GNU SASL Simple Authentication and Security Layer for the GNU system for version 1.7.0, 22 October 2010 Simon Josefsson

GNU SASL Simple Authentication and Security Layer for the GNU system for version 1.7.0, 22 October 2010 Simon Josefsson

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2015-08-11 16:46:22
17Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

Add to Reading List

Source URL: bacpuc.org.uk

Language: English - Date: 2016-02-25 06:22:14
18http://www.LinuxSecurity.com   Security Glossary:

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2000-09-18 13:37:46
19PLACES’10  The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
20How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00