Secure Computing

Results: 5296



#Item
241

To appear in IEEE Transactions on Dependable and Secure Computing. Cryptanalysis of a Privacy-Preserving Aggregation Protocol Amit Datta and Marc Joye

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2016-01-05 14:18:34
    242Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

    information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-01-05 23:25:04
    243Computing / Cyberwarfare / Computer security / E-commerce / Deception / Computer network security / Secure communication / Internet security / Malvertising / Malware / Ransomware / SonicWall

    Microsoft Word - Dell_Security Threat Report_Exec Summary_021816_4pm PT

    Add to Reading List

    Source URL: i.crn.com

    Language: English - Date: 2016-04-25 15:10:36
    244Computer architecture / Computing / Smartphones / Windows 10 / Windows 10 Mobile / Windows Phone / Microsoft Windows

    How to Connect U-Drive from Your Home Computer Install the Pulse Secure Client by clicking the link below or by opening a browser and going to: http://its.uark.edu/personal/vpn/ Select Windows

    Add to Reading List

    Source URL: agritech.uark.edu

    Language: English - Date: 2016-03-17 16:58:27
    245Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: mitls.org

    Language: English
    246Computer access control / Software / Computing / Computer security / Internet privacy / Hypertext Transfer Protocol / News aggregators / Proprietary software / HTTP cookie / Login / Password / Internet Explorer

    FAQ for Login Assistance 1. Logging in for the first time? The default Login ID for users logging in the first time is your ‘NRIC/ passport’. Upon successful login, you will be required to change to your choice Login

    Add to Reading List

    Source URL: secure.ifastpensions.com

    Language: English - Date: 2016-03-21 03:17:05
    247Cryptography / Computing / Cryptographic protocols / Internet protocols / Secure communication / Computer networking / Named data networking / Public-key cryptography / Encryption / Key / Symmetric-key algorithm / IPsec

    A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti Yanbin Lu

    Add to Reading List

    Source URL: irl.cs.ucla.edu

    Language: English - Date: 2011-11-01 01:23:50
    248Computing / Business / Economy / Cloud infrastructure / IBM / Cloud computing / Microsite / Cloud Strife

    CASE STUDY IBM – Think Cloud IBM’s objectives • Demonstrate IBM’s cloud capabilities (smart secure and ready for business).

    Add to Reading List

    Source URL: mediacentre.newscientist.com

    Language: English - Date: 2013-04-09 07:44:27
    249Philosophy / European Data Protection Supervisor / Giovanni Buttarelli / J. Peter Burgess / Technology / Information ethics / Privacy / Computing / Ethics / Internet privacy

    PRESS RELEASE EDPSBrussels, 28 January 2016 EDPS starts work on a New Digital Ethics Today, the European Data Protection Supervisor (EDPS) announced that the work

    Add to Reading List

    Source URL: secure.edps.europa.eu

    Language: English - Date: 2016-01-28 10:22:18
    250Software / Cryptographic software / Computing / Secure Shell / System software / Key management / Comparison of SSH servers / Ssh-agent / Ssh-keygen

    ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH) Murugiah Souppaya, Karen Scarfone, 1 and Larry Feldman, 2 Editors Computer Security Division Information Technol

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-01-11 10:13:44
    UPDATE