Secure Computing

Results: 5296



#Item
261Security / Computing / Computer security / Computer network security / Software testing / Cryptography / National security / Secure communication / InfraGard / Vulnerability / QuickTime

The Exploit Intelligence Project Dan Guido NYM InfraGard, https://www.isecpartners.com

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
262Data security / Identity management / Law / Privacy / Internet privacy / Information security / Cloud computing / Usability

Simply Secure  Founding principles:     1. The future of a positive, accessible, and people­centered Internet requires trustworthy  privacy and security.   2. If privacy and security aren’t e

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2014-04-29 10:37:05
263Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
264Computing / Security / Cloud computing / E-commerce / Secure communication / Crime prevention / National security / Cloud infrastructure / Payment Card Industry Data Security Standard / Threat Stack / Computer security / Stack

SO LU TIO N B RIEF SECURITY SOLUTIONS FOR PCI DSS AND PII The media and publishing industry’s increasing migration to and expansion in the cloud means you’re tasked with minimizing risk and ensuring compliance throu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-02 12:48:42
265Computing / Internet / E-commerce / Secure communication / Transport Layer Security / Proxy server / Load testing

Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.apicasystem.com Release Notes Version 5.4-I

Add to Reading List

Source URL: files.apicasystem.com

Language: English - Date: 2016-03-09 22:25:16
266

2 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 2,

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:28
    267Internet / Computing / Network architecture / Internet security / Secure communication / Content delivery network / Tor / Dark web / Cloudflare / CAPTCHA / The Tor Project /  Inc / Facebookcorewwwi.onion

    Fact Sheet: Cloud Flare and the Tor Project What is the Tor Project? The Tor Project (TorProject.org) is a non-profit organization that develops and distributes free software to help millions of people defend against onl

    Add to Reading List

    Source URL: people.torproject.org

    Language: English - Date: 2016-03-31 13:39:58
    268Cryptography / Computing / Secure communication / Cryptographic protocols / Internet protocols / E-commerce / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / RSA / HTTPS

    On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2015-08-21 05:45:15
    269Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    270Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

    Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2016-01-06 06:14:04
    UPDATE