Secure Computing

Results: 5296



#Item
311Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:24:10
312Computing / Software engineering / Computer security / Hacking / Functional languages / Web programming / JavaScript / Content Security Policy / Cross-site scripting / Same-origin policy / JSON / Code injection

PreparedJS: Secure Script-Templates for JavaScript Martin Johns SAP Research Abstract. Content Security Policies (CSP) provide powerful means to

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
313Computer security / Computing / Trusted computing / Cryptography / Trusted Execution Technology / X86 architecture / Trusted Platform Module / Monitor / Futures and promises / Trusted computing base / Polymerase chain reaction / Thread

A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2009-06-02 14:26:22
314Computing / Microsoft / Electronic documents / Information science / Microsoft Office / Webmail / Business intelligence / Records management / Portable Document Format / Email / Workshare / Checkbox

The Interactive Protect panel in Protect 9 offers you options to control and secure your attachments before sending your email. See metadata in attachments Open Outlook, create a new email and attach one or more

Add to Reading List

Source URL: d3liiczouvobl1.cloudfront.net

Language: English - Date: 2015-01-06 11:10:00
315Computing / Software / Internet / Internet security / Dark web / Secure communication / Tor / The Tor Project /  Inc / Linux kernel / Vidalia

From: Andrew Lewman, Executive Director To: the tor community Date: June 8, 2011 This report documents progress in May 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-09-15 09:57:06
316Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2014-02-27 10:40:02
317Computing / Internet / Internet privacy / Internet security / Internet protocols / Secure communication / Content-control software / Tor / Internet censorship in China / Proxy server / Internet censorship circumvention / SOCKS

How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English
318Computing / Java enterprise platform / Web services / Java platform / Enterprise application integration / Apache CXF / Java API for RESTful Web Services / Talend / HATEOAS / Ns

Microsoft PowerPoint - Andrei_Shakirin_REST_Secure_CXF

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-10-03 13:17:03
319Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
320

Intel Science and Technology Center for Secure Computing 2012 BEST POSTER AWARD Juxtapp: A Scalable System for Detecting

Add to Reading List

Source URL: scrub.cs.berkeley.edu

- Date: 2012-06-04 18:04:34
    UPDATE