Public computer

Results: 14618



#Item
331Computing / Fault-tolerant computer systems / Engineering / Byzantine fault tolerance / Failure / Fault tolerance / Public-key cryptography / Theory of computation / Evaluation / Fault injection / Dependability / Latency

BFT-B ENCH : F RAMEWORK TO E VALUATE R OBUSTNESS AND EFFECTIVENESS OF BFT P ROTOCOLS IN P RACTICE Divya Gupta, Lucas Perronne University of Grenoble, LIG, France Sara Bouchenak

Add to Reading List

Source URL: acmsocc.github.io

Language: English - Date: 2016-02-21 03:10:50
332Software licenses / Free software / Free and open-source software licenses / Computer law / Copyleft / Open-source software / Free and open-source software / GNU General Public License / Multi-licensing / Open-source movement / Proprietary software / Shared source

Fitzgerald/Transformation of Open Source Software ISSUES & OPINIONS THE TRANSFORMATION OF OPEN SOURCE SOFTWARE1 By:

Add to Reading List

Source URL: www.brian-fitzgerald.com

Language: English - Date: 2014-01-03 08:24:16
333Copyleft / Law / Open content / Computer law / Intellectual property law / Information / Digital art / Public copyright licenses / Creative Commons / Definition of Free Cultural Works / Public Domain Mark / Remix

Introduction Creative Commons (CC) is a non-profit organization with a global network of affiliates. Our mission is to make it easy for individuals and institutions to access, build on, and help grow the public commons o

Add to Reading List

Source URL: creativecommons.org.au

Language: English - Date: 2015-11-17 18:12:53
334Cryptography / Key management / Public key infrastructure / Identity management / Computer access control / Social networking services / Internet privacy / Authentication / Privacy / Web of trust / Airbnb / Public key certificate

Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data A White Paper from Rebooting the Web of Trust

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
335Graphics file formats / Computer graphics / Computing / Image processing / Halftone / Raster graphics / Dots per inch / TIFF / Image file formats / Encapsulated PostScript / Adobe Photoshop / Bitmap

Digital Art Prep Guide SISP requires you submit figures in electronic format. This guide will help with the basics of electronic art file preparation for printed publications. This is an example of B&W line art. The best

Add to Reading List

Source URL: public.media.smithsonianmag.com

Language: English - Date: 2015-09-29 16:39:52
336Debian / Software / Computer architecture / Free software / Software in the Public Interest

Software in the Public Interest, IncAnnual Report 1st July 2012 To the membership, board and friends of Software in the Public Interest, Inc:

Add to Reading List

Source URL: www.spi-inc.org

Language: English - Date: 2016-04-13 13:14:48
337Security / Government / Safety / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
338Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
339Security / Prevention / Safety / Crime prevention / Cryptography / National security / Information governance / Public safety / Computer security / Security guard

Case Study: Global Security Services “We easily have saved at least 5 hours a week on just B*!!S#*! and paperwork. Like filing and looking up customers. We have really customized the fields that are customizable so ev

Add to Reading List

Source URL: www.hindsitesoftware.com

Language: English - Date: 2012-04-23 11:46:18
340Cryptography / Computer security / Security / ISO standards / Computer network security / Computer access control / Smart card / Ubiquitous computing / Authentication / Public-key cryptography / FIPS 140-2 / Security and safety features new to Windows Vista

Microsoft Word - SC037 _2015__v3

Add to Reading List

Source URL: www.stc.tid.gov.hk

Language: English - Date: 2015-10-01 12:03:19
UPDATE