Public computer

Results: 14618



#Item
921Simple public key infrastructure / PERMIS / X.500 / Public key certificate / Cryptography / Public-key cryptography / Key management

A Logic for Analysing Subterfuge in Delegation Chains Hongbin Zhou and Simon N. Foley Department of Computer Science, University College Cork, Ireland. {zhou,s.foley}@cs.ucc.ie

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-08-04 06:41:57
922Computer security / Security / Public key infrastructure / Trusted Computing / Public key certificate / Security token / Public-key cryptography / Key management / Cyberwarfare

SHEMP: Secure Hardware Enhanced MyProxy A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 17:25:52
923Semiconductor companies / Afghanistan Public Policy Research Organization / Intel / Nielsen ratings / Hewlett-Packard / Brand / Computer hardware / Marketing / Computing

householding garage access from Specific Media Own the Household Garage

Add to Reading List

Source URL: specificmedia.com

Language: English - Date: 2013-12-18 16:09:27
924Public safety / Birla Institute of Technology and Science / Computer security / Information security / Institute of Electrical and Electronics Engineers / Security engineering / Cloud computing / Knowledge management / Pilani / Security / Crime prevention / National security

CALL FOR PAPERS A Special Issue on Secure Knowledge Management in Big-data era Information is increasingly becoming important in our daily lives. We have become information dependents of the twenty-first century, living

Add to Reading List

Source URL: www.som.buffalo.edu

Language: English - Date: 2014-06-30 22:56:35
925National security / Computer network security / Computer security / Physical security / Security guard / Radio-frequency identification / Burglar alarm / Security / Crime prevention / Public safety

Site security Best practice guidance for construction companies Construction sites are an easy target for thieves. The lure of quick and easy profits attracts them to high-value plant and equipment. Arson and malicious d

Add to Reading List

Source URL: www.cesarscheme.org

Language: English - Date: 2013-01-18 05:19:46
926Computer hardware / Multi-touch / IPad / App Store / IPhone / Engadget / IOS / Apple Inc. / Computing / ITunes

Public Relations Case Study HarperCollins UK Drives $500,000 in Revenue and 81,000 App Downloads with U.S. App Launch Campaigns

Add to Reading List

Source URL: www.walkersands.com

Language: English - Date: 2014-12-18 14:23:22
927Central processing unit / Coprocessor / Acorn Computers / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / IBM / HTTP cookie / Cryptography / Computing / Computer architecture

Practical server privacy with secure coprocessors by S. W. Smith D. Safford

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:48:27
928Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 06:51:37
929Computer network security / Password / Digital media / Computer security / Internet / Power outage / Server / Public safety / Network switch / Security / Crime prevention / National security

Introduction to Physical Security and Security of Services Jennifer Vesperman 2002−02−24

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2002-03-20 10:00:48
930Distributed hash table / Chord / Peer-to-peer / Hash table / Prefix hash tree / Lookup table / PlanetLab / Trie / Kademlia / Distributed data storage / Computing / Computer programming

OpenDHT: A Public DHT Service and Its Uses Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu UC Berkeley and Intel Research

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2005-06-20 16:13:06
UPDATE