Domain privacy

Results: 363



#Item
41Identity documents / Domain name system / Internet Standards / Internet protocols / Internet privacy / Personally identifiable information / Privacy / HTTP cookie / Password / DNS hijacking / Google Public DNS

Privacy Policy DNS Made Easy values your privacy. Please read the following document carefully as this is the official policy in force at the present time. The policy listed below outlines how DNS Made Easy handles priva

Add to Reading List

Source URL: www.dnsmadeeasy.com

Language: English - Date: 2015-12-08 13:37:24
42Computing / WHOIS / Radix / Domain name / Privacy policy / .host / Domain name registrar

Radix – Privacy Policy 1. Introduction Radix FZC and its subsidiaries (“Radix”) are committed to protecting the privacy of those who register domain names (“Registered Name Holders”) and make use of its Interne

Add to Reading List

Source URL: radix.website

Language: English - Date: 2014-08-25 01:33:36
43Internet / Internet Standards / Internet protocols / Network architecture / Generic top-level domains / Country code top-level domains / Domain name system / WHOIS / Domain name / Domain registration / .name / Domain privacy

Who is .com? Learning to Parse WHOIS Records Suqi Liu Ian Foster

Add to Reading List

Source URL: www.sysnet.ucsd.edu

Language: English - Date: 2015-09-24 14:12:25
44

36 International Journal of Information Security and Privacy, 7(3), 36-52, July-SeptemberA Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain

Add to Reading List

Source URL: www.tyronegrandison.org

Language: English - Date: 2013-12-05 23:52:20
    45Computing / Internet / Domain name system / Internet Standards / Internet protocols / Internet privacy / Paxfire / Hacking / OpenDNS / Domain Name System Security Extensions / Alternative DNS root / Proxy server

    Redirecting DNS for Ads and Profit Nicholas Weaver ICSI Christian Kreibich ICSI

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:01
    46

    Proceedings on Privacy Enhancing Technologies 2015; ):1–19 David Fifield*, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson Blocking-resistant communication through domain fronting

    Add to Reading List

    Source URL: censorbib.nymity.ch

    Language: English
      47Network architecture / Computer network security / Internet privacy / Internet protocols / Hacking / DNS hijacking / Name server / Proxy server / Botnet / Internet / Computing / Domain name system

      Operation Ghost Click: The Rove Digital Takedown

      Add to Reading List

      Source URL: www.trendmicro.com

      Language: English - Date: 2012-07-02 22:28:05
      48

      2013 IEEE Security and Privacy Workshops Multi-Domain Information Fusion for Insider Threat Detection Hoda Eldardiry, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka Palo Alto Research Center (PARC)

      Add to Reading List

      Source URL: ieee-security.org

      - Date: 2013-05-05 16:29:32
        49

        2013 IEEE Security and Privacy Workshops Use of Domain Knowledge to Detect Insider Threats in Computer Activities William T. Young, Henry G. Goldberg, Alex Memory, James F. Sartain, Ted E. Senator SAIC Arlington, VA, US

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2013-05-05 16:04:50
          50

          2013 IEEE Security and Privacy Workshops Use of Domain Knowledge to Detect Insider Threats in Computer Activities William T. Young, Henry G. Goldberg, Alex Memory, James F. Sartain, Ted E. Senator SAIC Arlington, VA, US

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2013-05-05 16:04:50
            UPDATE