Secure Computing

Results: 5296



#Item
131Cryptography / Public-key cryptography / Homomorphic encryption / Secure multi-party computation / Cryptographic protocol / Paillier cryptosystem / Privacy / Digital signature / Internet privacy / Zero-knowledge proof / Encryption / Cloud computing security

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
132Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Cookie / World Wide Web / Computing / Hypertext / Secure cookies

Cookies on www.robeco.com The overview below lists the nonfunctional cookies used on this website and explains their use. Category Cookie

Add to Reading List

Source URL: www.robeco.com

Language: English - Date: 2015-12-08 02:34:11
133Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Transport Layer Security / Internet Standards / HTTPS

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
134Computing / Computer hardware / Thin clients / Dell / Server hardware

Accessing patient data when and where it matters most Hospital Consorci Sanitari del Garraf cost-effectively enhances healthcare provision to patients by giving clinicians secure mobile access to data across its three si

Add to Reading List

Source URL: i.dell.com

Language: English - Date: 2015-06-19 18:04:34
135Internet / Regional Internet registries / Computing / Rseaux IP Europens Network Coordination Centre / AFRINIC / Internet governance / ICANN / Internet Governance Forum / Latin America and Caribbean Network Information Centre / NetMundial Initiative / Asia-Pacific Network Information Centre / American Registry for Internet Numbers

NRO Update To be the flagship and global leader for collaborative Internet number resource management as a central element of an open, stable and secure Internet

Add to Reading List

Source URL: ripe69.ripe.net

Language: English - Date: 2014-11-07 03:59:26
136Computing / Software / Free software / Dark web / Secure communication / Cryptographic software / Tor / I2P / Onion routing / HTTPS / Mixminion / Internet Relay Chat

Revisiting Circuit Clogging Attacks on Tor Eric Chan-Tin, Jiyoung Shin and Jiangmin Yu Department of Computer Science Oklahoma State University {chantin, jiyoung, jiangmy}@cs.okstate.edu Abstract—Tor is a popular anony

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2013-11-08 14:52:20
137Software / Computing / Content management systems / Scripting languages / Cross-platform software / MediaWiki / TeamSite / HP Autonomy / JavaScript / Oracle Database / Web content management system

Christopher G. Brenz Christopher G. Brenz OBJECTIVE My goal is to secure a Digital Director position, and draw upon my substantial architecture and consulting experience to lead a team of developers in delivering world-

Add to Reading List

Source URL: www.brenz.net

Language: English - Date: 2015-06-20 19:31:14
138Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
139System software / Software / Computing / Data recovery / Dd / Disk cloning / Device file / Mount / Secure Digital / Filesystem Hierarchy Standard

Step 1.5: Burning the image  How to burn the image from a Linux computer    Resources:  ­ 32 GB SD card  ­ Adapter 

Add to Reading List

Source URL: duckietown.mit.edu

Language: English - Date: 2016-08-18 14:45:02
140Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE