Secure Computing

Results: 5296



#Item
11

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 15, NO. 2,

Add to Reading List

Source URL: www.cs.wayne.edu

Language: English - Date: 2018-04-17 23:18:16
    12

    Nontermination and Secure Information Flow ∗ Geoffrey Smith and Rafael Alp´ızar School of Computing and Information Sciences Florida International University Miami, FLUSA October 24, 2011

    Add to Reading List

    Source URL: users.cis.fiu.edu

    Language: English - Date: 2011-10-24 15:43:42
      13

      Secure Cloud Computing for Medical Data Daniel J. Bernstein, Carl Ellison, Tanja Lange, Kristin Lauter, Victor Miller, Michael Naehrig, and Eran Tromer Abstract. We answer a recent challenge by Benaloh, Lauter, Horvitz,

      Add to Reading List

      Source URL: www.anagram.com

      - Date: 2011-11-17 03:16:14
        14

        IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5, NO. 3,

        Add to Reading List

        Source URL: java.uom.gr

        - Date: 2015-11-06 10:19:42
          15

          Technology In-Depth Using Preemption-Threshold Scheduling to Cut Overhead While Meeting Deadlines By Dr. Alexander G. Dean, Center for Efficient, Secure and Reliable Computing,

          Add to Reading List

          Source URL: www4.ncsu.edu

          - Date: 2014-03-16 21:02:49
            16

            Hybrid Timing Analysis of Modern Processor Pipelines via Hardware/Software Interactions ∗ Sibin Mohan and Frank Mueller Dept. of Computer Science, Center for Efficient, Secure and Reliable Computing, North Carolina Sta

            Add to Reading List

            Source URL: moss.csc.ncsu.edu

            - Date: 2008-03-07 15:57:58
              17Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Hypertext Transfer Protocol / Internet security / HTTPS / Crimeware / Internet privacy / Transport Layer Security / Bolt

              Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

              Add to Reading List

              Source URL: rich.recoil.org

              Language: English - Date: 2006-04-19 14:01:38
              18Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

              2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2015-05-11 16:43:10
              19Software / Microsoft / Computing / Computer access control / Password / Security / Outlook.com / Login / ECos / Teal / Email

              TEAL and ECOS Access Instructions for Educators

              Add to Reading List

              Source URL: secure.sbec.state.tx.us

              Language: English - Date: 2016-07-18 07:17:46
              20Secure Digital / Computer hardware / Computing / Software

              UCIT Basic-Live 2 Camera Desktop Viewer User Guide

              Add to Reading List

              Source URL: www.driverlocate.com

              Language: English - Date: 2015-09-29 12:58:36
              UPDATE