Secure Computing

Results: 5296



#Item
221Cryptography / Computing / Computer security / HTTP Strict Transport Security / Password / PBKDF2 / Bcrypt / Scrypt / JavaScript / Salt

Developing with Catalyst as securely as possible What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty

Add to Reading List

Source URL: birmingham.pm.org

Language: English - Date: 2014-12-04 13:54:55
222Computing / Computer security / Cyberwarfare / Computer network security / Secure communication / Hacking / Software testing / Vulnerability / Resource fork / Firewall / Resource / Electronic filter

Jigsaw: Protecting Resource Access by Inferring Programmer Expectations Hayawardh Vijayakumar and Xinyang Ge, The Pennsylvania State University; Mathias Payer, University of California, Berkeley; Trent Jaeger, The Pennsy

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
223Pseudorandom number generators / Cryptography / Randomness / Applied mathematics / Random number generation / Fortuna / Data-intensive computing / Pseudorandomness / Random walk / Cryptographically secure pseudorandom number generator

Myriad: Scalable and Expressive Data Generation Alexander Alexandrov∗ Kostas Tzoumas∗ Volker Markl∗

Add to Reading List

Source URL: stratosphere.eu

Language: English - Date: 2016-05-27 12:05:58
224Computing / Internet / Internet privacy / Internet security / Internet protocols / Secure communication / Content-control software / Internet censorship in China / Tor / Proxy server / Internet censorship circumvention / SOCKS

How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se Abstract

Add to Reading List

Source URL: www.cs.kau.se

Language: English
225Automatic identification and data capture / Barcode / Encodings / Records management technology / Computing / Bluetooth / Secure Digital / Computer hardware / Technology / O2 Xda

IT-600 Series Next Generation PDA Style Industrial Data Terminal Survives the Elements in Extreme Environments

Add to Reading List

Source URL: www.casio4business.com

Language: English - Date: 2009-09-22 17:18:51
226Computing / Technology / Network protocols / Wireless networking / Networking hardware / Computer network security / Port forwarding / Routing / Universal Plug and Play / Wi-Fi / Ethernet / Router

LS-PTC300 CAMERA MANUAL Hardware Installation 1) Insert the power cable and the Wi-Fi antenna into their respective ports on the camera. Tighten the Wi-Fi antenna until it is secure and not loose. 2) Insert one end of t

Add to Reading List

Source URL: www.lockstate.com

Language: English - Date: 2015-04-30 17:25:58
227Computing / Information technology / Data management / Radio-frequency identification / Database / Data architecture / Computer security / Internet of things / Interoperability / Embedded system / Wireless sensor network / Data warehouse

Challenges of Secure and Reliable Data Management in Heterogeneous Environments Norbert Siegmund, Janet Feigenspan, Michael Soffner, Jana Fruth, Veit Köppen Otto-von-Guericke University Magdeburg, Germany {nsiegmun, fe

Add to Reading List

Source URL: wwwiti.cs.uni-magdeburg.de

Language: English - Date: 2011-03-23 13:27:55
228Cryptography / Computing / Software / Hypertext Transfer Protocol / Transport Layer Security / Secure communication / Cryptographic protocols / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / HTTPS / Browser security

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-07-30 05:47:43
229Hypertext Transfer Protocol / Internet privacy / Computing / World Wide Web / HTTP cookie / Computer security / Google Analytics / HTTPS / Session / Secure cookies / Zombie cookie

PRIVACY POLICY AND COOKIES ZARA 1. Every time you use this website, you will be bound by the then current Privacy Policy and you should review this text every time you use the website to be sure you agree with it. 2. Per

Add to Reading List

Source URL: static.zara.net

Language: English - Date: 2015-12-21 07:34:52
230Cryptography / Pico / Public-key cryptography / Secret sharing / RSA / Secure cryptoprocessor / Cryptographic nonce / Password

1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-06-23 18:45:47
UPDATE