Secure Computing

Results: 5296



#Item
281Internet privacy / Hypertext Transfer Protocol / Computing / Computer access control / HTTP cookie / Computer security / Cyberspace / Local shared object / Session / Evercookie / Secure cookies

UseLab Sp. z o. o. respect a privacy of www.uselab.pl Users. The implementation of this policy aims to inform Users how they can protect their privacy during using the Service. Therefore, we encourage you to familiarize

Add to Reading List

Source URL: www.uselab.pl

Language: English - Date: 2016-02-13 07:41:17
282Software engineering / Computing / Software / Compiler construction / Formal methods / Logic in computer science / Programming language implementation / Functional languages / Programming language / Semantics / Compiler / Low-level programming language

Efficient Formally Secure Compilers to a Tagged Architecture General Information machine-checked proofs of full abstraction with respect to a secure high-level semantics [3]. This is much stronger than

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2015-12-11 07:16:08
283Computing platforms / MINIX / Firewall / Microkernel / Netfilter

Secure and Reliable Firewall Systems based on MINIX 3 R¨ udiger Weis Beuth Hochschule f¨ ur Technik Berlin

Add to Reading List

Source URL: www.minix3.org

Language: English - Date: 2016-02-24 10:09:43
284

OPEN POSITIONS Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt The new Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt is jointly operated by In

Add to Reading List

Source URL: www.trust.informatik.tu-darmstadt.de

Language: English - Date: 2013-10-15 08:36:02
    285

    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 4, NO. 2,

    Add to Reading List

    Source URL: nsl.cse.unt.edu

    Language: English - Date: 2012-01-12 18:21:17
      286Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Network performance / Proxy server / HTTP cookie / Transport Layer Security / Email

      REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

      Add to Reading List

      Source URL: reefogc.com

      Language: English - Date: 2010-08-20 15:18:56
      287

      Secure distributed computing on a Java CardTM? Grid Position paper RRSerge Chaumette, Pascal Grange, Achraf Karray?? , Damien Sauveron? ? ?,† and Pierre Vigneras LaBRI, Laboratoire Bordelais de Recherche en In

      Add to Reading List

      Source URL: damien.sauveron.fr

      Language: English - Date: 2013-02-26 15:54:32
        288

        Secure Computing Workshop: Group 2 Brief-out 1 Scenario – Sensor Fusion

        Add to Reading List

        Source URL: www.cisr.us

        Language: English - Date: 2008-05-29 17:45:06
          289Computing / Smartphones / Computer hardware / Software / Android / Secure Digital / Factory reset / Nexus One / HTC Desire / MultiMediaCard / HTC One / Trim

          Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-05-20 23:58:44
          290

          Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes Matthias Schmidt, Niels Fallenbeck, Matthew Smith, Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg Hans-Meerw

          Add to Reading List

          Source URL: www.dcsec.uni-hannover.de

          Language: English - Date: 2010-11-03 12:17:51
            UPDATE