Privacy software

Results: 6129



#Item
481Firefox / Mozilla Foundation / HTTP cookie / Software / Free software / Mozilla

How user data is protected on Firefox New Tab Suggested tiles are powered by a recommendation system that acts on behalf of the user, delivering relevance while respecting Still have questions? privacy. Here is basicall

Add to Reading List

Source URL: blog.mozilla.org

Language: English - Date: 2015-05-20 22:16:46
482Internet privacy / Facebook / Privacy / World Wide Web / Software / Computing

LIM  College  Social  Media  Policy  and  Guidelines     Many  of  LIM  College’s  current  and  prospective  students,  faculty,  staff,  alumni,  and  indu

Add to Reading List

Source URL: www.limcollege.edu

Language: English - Date: 2014-07-24 10:43:28
483Internet censorship / Internet privacy / Proxy servers / Reverse proxy / Computer network security / Ultrasurf / Great Firewall of China / Internet censorship circumvention / Squid / Computing / Software / Internet

Technical analysis of the Ultrasurf proxying software Jacob Appelbaum The Tor Project Abstract Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a t

Add to Reading List

Source URL: media.torproject.org

Language: English - Date: 2012-04-16 15:36:36
484Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2012-12-19 05:32:22
485Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security

2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:27
486Computer network security / Internet privacy / Network architecture / Help desk / Password / Wi-Fi / Moodle / Virtual private network / Eduroam / Software / Educational software / Computing

Vienna University Computer Center Zentraler Informatikdienst = ZID Information and Communication Technology for University Melina Tsiamos

Add to Reading List

Source URL: doktorat.univie.ac.at

Language: English - Date: 2015-03-06 04:11:23
487Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security

2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:08
488Data / Internet privacy / BitTorrent / Internet standards / SOCKS / Cross-platform software / User Datagram Protocol / Transmission Control Protocol / Tor / Software / Computing / Internet protocols

Evaluation of a libutp-based Tor Datagram Implementation Karsten Loesing, Steven J. Murdoch, and Rob Jansen ,, Tor Tech Report

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2013-10-30 06:23:17
489Text mode / Wget / Capability-based security / Capsicum / Process / Programming language / Computer program / Computer security / Algorithm / Software / Computing / Portable software

2013 IEEE Symposium on Security and Privacy Declarative, Temporal, and Practical Programming with Capabilities William R. Harris∗ , Somesh Jha∗ , Thomas Reps∗† , Jonathan Anderson‡ , and Robert N. M. Watson‡

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-04-05 19:52:14
490Crime prevention / National security / Forschungszentrum Informatik / CeBIT / Software protection dongle / Vulnerability / Application security / Security / Cyberwarfare / Computer security

Press Release No. 024 | kes | March 05, 2015 CeBIT: Security in a Smart World Cameras Compliant with Data Protection Legislation/ Privacy-respecting Smart Meters/ Simultaneous Translator/ Safe without Emergency Button/ S

Add to Reading List

Source URL: www.kit.edu

Language: English - Date: 2015-03-05 04:34:20
UPDATE