Secure Computing

Results: 5296



#Item
301Computing / Software / Statistical classification / Machine learning / Secure communication / Internet privacy / Parts of speech / Tor / Naive Bayes classifier / Deep packet inspection / Supervised learning / Facebook

A Critical Evaluation of Website Fingerprinting Attacks Marc Juarez1 , Sadia Afroz2 , Gunes Acar1 , Claudia Diaz1 , Rachel Greenstadt3 1 KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium

Add to Reading List

Source URL: securehomes.esat.kuleuven.be

Language: English - Date: 2014-10-01 09:30:05
302Cloud storage / Network file systems / Data management / Object storage / Cloud computing / Computer data storage / Data / Amazon S3 / Nirvanix / XAM / Clustered file system / Data defined storage

00 D EP S KY: Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, University of Lisbon, Faculty of Sciences Miguel Correia, Instituto Superior T´ecnico / INESC-ID Bruno Quaresma, University of Lisbon, Fa

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-04-24 03:55:42
303

A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing Himanshu Tyagi and Shun Watanabe

Add to Reading List

Source URL: ec14.compute.dtu.dk

Language: English - Date: 2014-05-16 06:52:01
    304

    DAG-Based Software Frameworks for PDEs Martin Berzins, Qingyu Meng, John Schmidt, and James C. Sutherland 1 Scientific Computing and Imaging Institute, 1 Institute for Clean and Secure Energy, University of Utah, Salt La

    Add to Reading List

    Source URL: www.sci.utah.edu

    Language: English - Date: 2012-03-02 16:54:53
      305Internet Standards / Computing / Internet / Network architecture / File Transfer Protocol / Comparison of FTP client software / Software standard / File format / FTPS / Secure file transfer protocol

      Microsoft Word - Reverse Transfer Implementation Guide

      Add to Reading List

      Source URL: studentclearinghouse.info

      Language: English - Date: 2016-03-03 15:27:18
      306Cryptocurrencies / Bitcoin / Alternative currencies / Computing / E-commerce / Currency / Bitcoin network / Hashing / B-tree / Blockchain / Cryptographic hash function / Draft:Viccoin:APeer-to-PeerDigital Currency System

      Secure High-Rate Transaction Processing in Bitcoin Yonatan Sompolinsky1 and Aviv Zohar1,2 1 School of Engineering and Computer Science,

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:33:39
      307Software / Computing / Tor / Internet security / Dark web / Secure communication / The Tor Project /  Inc / Firefox / NoScript / Vidalia / Libevent

      From: Andrew Lewman, Executive Director To: the tor community Date: April 10, 2011 This report documents progress in March 2011.

      Add to Reading List

      Source URL: archive.torproject.org

      Language: English - Date: 2011-09-15 09:57:05
      308Privacy law / Information privacy / Computing / Privacy / Digital rights / Human rights / Government / European Data Protection Supervisor / General Data Protection Regulation / Personally identifiable information / Internet privacy / Right to privacy

      OpinionTowards a new digital ethics Data, dignity and technology 11 September 2015

      Add to Reading List

      Source URL: secure.edps.europa.eu

      Language: English - Date: 2015-09-11 08:48:50
      309Computing / Software / Workflow technology / Hadoop / Apache Software Foundation / Cloud infrastructure / Data management / Apache Hadoop / Cuneiform / Galaxy / Bioinformatics / Workflow

      BiobankCloud: a Platform for the Secure Storage, Sharing, and Processing of Large Biomedical Data Sets Alysson Bessani5 , Jörgen Brandt2 , Marc Bux2 , Vinicius Cogo5 , Lora Dimitrova4 , Jim Dowling1 , Ali Gholami1 , Kam

      Add to Reading List

      Source URL: www.di.fc.ul.pt

      Language: English - Date: 2015-07-24 06:48:04
      310Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

      Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

      Add to Reading List

      Source URL: aaspring.com

      Language: English - Date: 2015-01-16 19:16:47
      UPDATE