Secure Computing

Results: 5296



#Item
141Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
142Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
143Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
144Internet / Computing / E-commerce / Internet security / Secure communication / Transport Layer Security / Network architecture

KYLE GRAHAM SCHOMP 364 Riverway, #26 Boston, MA5473 https://kyle.schomp.info/

Add to Reading List

Source URL: kyle.schomp.info

Language: English - Date: 2016-05-31 23:40:45
145File sharing networks / File sharing / Software / Cross-platform software / Computing / Analytic geometry / Coordinate system / Peer-to-peer / Node / GiFT

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim {dchantin, feldman, hopper, kyd}@cs.umn.edu University of Minnes

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
146Computing / Network architecture / Internet / Multihoming / Cryptographic protocols / Internet protocols / Identifier/Locator Network Protocol / IPsec / Internet protocol suite / Transmission Control Protocol

Fast,&Secure&Failover&for&IP& Saleem&Bha:& &&&Ditchaphong&PhoomikiaDssak& Ran&Atkinson&

Add to Reading List

Source URL: saleem.host.cs.st-andrews.ac.uk

Language: English - Date: 2014-10-06 15:05:30
147Computing / Concurrent computing / Distributed computing / Internet broadcasting / Computer networking / Streaming / Multimedia / File sharing networks / Content delivery network / Throughput / Adaptive bitrate streaming / Mobile CDN

Kivuto adds fast, secure software delivery to its value pitch

Add to Reading List

Source URL: web1.cachefly.net

Language: English - Date: 2016-01-01 15:11:43
148Software / Computing / System software / Acxiom / Information privacy / Linux on z Systems / Mainframe computer / Z/OS / VM / VSE / Linux

Acxiom® Mainframe Services Reduce your risk and cost with Acxiom’s comprehensive, secure mainframe services Mainframe challenges Despite ongoing predictions about its demise, the mainframe continues to be the IT lifeb

Add to Reading List

Source URL: www.acxiom.jp

Language: English - Date: 2016-08-09 17:31:31
149Computing / Computer hardware / Computer data storage / Digital forensics / Computer storage media / Non-volatile memory / Solid-state drive / Data erasure / Forensic disk controller / Computer security / Forensic science / Forensic search

MediaClone Market Positioning Vision Statement MediaClone is the leading provider of Mobile Computer Forensic Units - Complete Investigation Platforms for field operations; Secure and Economical Devices for Fast Data Era

Add to Reading List

Source URL: www.media-clone.net

Language: English - Date: 2015-07-31 13:11:05
150Computer access control / Computer security / Computing / Computer network security / Federated identity / Wireless networking / Internet protocols / Authentication / IEEE 802.1X / RADIUS / Single sign-on / Mutual authentication

Secure Authentication System for Public WLAN Roaming ‡ Yasuhiko Matsunaga †

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 19:56:51
UPDATE