Secure Computing

Results: 5296



#Item
291

CALL FOR PAPERS Pervasive and Mobile Computing Special Issue on “Secure ubiquitous computing“ Overview

Add to Reading List

Source URL: voyager.ce.fit.ac.jp

Language: English - Date: 2014-03-06 20:13:15
    292

    PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi Prateek Saxena, Shruti Tople School of Computing, National Uni

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-10-02 00:46:53
      293Computing / Cryptography / Internet / Cryptographic protocols / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / OpenSSL / Comparison of TLS implementations / Cipher suite / WolfSSL

      1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

      Add to Reading List

      Source URL: smacktls.com

      Language: English - Date: 2015-03-05 00:10:02
      294

      Design and Test of ICs for Secure Embedded Computing A Survey of LightweightCryptography Implementations Thomas Eisenbarth Ruhr University Bochum

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2010-04-20 20:57:43
        295

        Im Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt ist ab sofort die Stelle für eine/einen wissenschaftliche/n Mitarbeiterin/Mitarbeiters zu besetzen. Die Stelle ist auf ein 1 Jahr

        Add to Reading List

        Source URL: www.trust.informatik.tu-darmstadt.de

        Language: German - Date: 2014-11-04 08:33:57
          296Prevention / Computing / Safety / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Cyber-physical system / Dependability

          DECSoS 2015: EWICS/ERCIM/ARTEMIS Dependable Cyber-Physical Systems and Systems-of-Systems Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

          Add to Reading List

          Source URL: safecomp2015.tudelft.nl

          Language: English - Date: 2015-09-14 10:24:23
          297Computing / Software / Scripting languages / System administration / Formal languages / Expect / Tk / Login / Secure Shell / Syslog / Perl / Scope

          Using SEC Dav i d L a n g David Lang is a Staff IT Engineer at Intuit, where he has spent more than a decade working

          Add to Reading List

          Source URL: www.usenix.org

          Language: English
          298

          Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled1 , Tal Malkin1 , Mariana Raykova1 , and Moti Yung2 2

          Add to Reading List

          Source URL: www.cs.columbia.edu

          Language: English - Date: 2011-10-19 22:40:50
            299

            Im Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt ist abdie Stelle für eine/einen Postdoktorandin/Postdoktoranden zu besetzen. Die Stelle ist auf ein 1 Jahr befristet u

            Add to Reading List

            Source URL: www.trust.informatik.tu-darmstadt.de

            Language: German - Date: 2014-06-26 07:34:07
              300Computing / Internet / Network architecture / Secure communication / Internet Standards / Computer network security / Internet protocols / Internet security / SoftEther VPN / Tor / Transport Layer Security / HTTPS

              Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

              Add to Reading List

              Source URL: www.icir.org

              Language: English - Date: 2015-10-05 18:07:52
              UPDATE