Public computer

Results: 14618



#Item
991Public-key cryptography / Key management / Kerberos / Virtual synchrony / Cryptography / Cryptographic protocols / Computer network security

The Cost of Adding Security Services to Group Communication Systems Cristina Nita-Rotaru Advisor: Dr. Yair Amir Submitted in partial fulfillment of the Ph.D. qualifiers Department of Computer Science

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
992Public safety / .mobi / Computer security / Prevention / Security / OWASP / Computer network security

OWASP Mobile Top Ten 2015 Strategic Roadmap Agenda •  OWASP Mobile Top Ten Context •  Key Goals / Strategies for 2015

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-02-17 12:17:25
993Mixed reality / User interface techniques / Nature / Multimodal interaction / Augmented reality / ARToolKit / Ambient intelligence / World Technology Award / Reality / Human–computer interaction / Virtual reality

July 2004 Issue Seven Design guru attracts big audience to public lecture

Add to Reading List

Source URL: hitlabnz.org

Language: English - Date: 2014-02-20 17:20:00
994Edmund M. Clarke / Mark Kryder / Carnegie Mellon University / Carnegie Mellon School of Computer Science / Engineering and Public Policy / M. Satyanarayanan / Institute of Electrical and Electronics Engineers / Government / Academia / Engineering

current_mast_b&w_spr07

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2014-10-08 01:14:30
995Crime prevention / Computer network security / Surveillance / Video / Cyberoam / Application firewall / IP camera / Closed-circuit television / Cross-site scripting / Security / National security / Public safety

PDF Document

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2013-08-02 04:54:11
996Cyberwarfare / Applied mathematics / Digital signature / RSA / ID-based encryption / Information security / Elliptic curve cryptography / Cryptography / Public-key cryptography / Security

1 BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems Attila A. Yavuz and Peng Ning Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
997Notary / Computer security / Man-in-the-middle attack / Secure Shell / Certificate authority / Notary public / Key authentication / Non-repudiation / Cryptography / Key management / Public-key cryptography

Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2008-05-29 17:15:02
998Test case / Test / Computer security / Vulnerability / Software testing / Evaluation / Education

Special PublicationSource Code Security Analysis Tool Test Plan Draft 1 for public comment of Version 1.0

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:56
999Cyberwarfare / Software testing / Crime prevention / National security / Penetration test / Application security / Vulnerability / Information security / Code audit / Computer security / Computer network security / Security

U.S. Public Sector HP Vulnerability Assessment Services Increase awareness of growing security threats At-A-Glance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:15
1000National security / Security guard / Surveillance / Computer security / Crime prevention / Security / Public safety

ENTERPRISE SERVICES to help keep rates down. Security officers on patrol also scan a barcode on a PDA at each stop, which tells them if there is anything in particular that they should check in that room. Such as, if a p

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2015-03-23 10:12:43
UPDATE