Secure Computing

Results: 5296



#Item
341Computing / Internet / Internet security / Dark web / Internet Standards / Internet protocols / Secure communication / Tor

From: Andrew Lewman, Executive Director To: The Tor Community Date: November 8, 2011 This report documents progress in October 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-11-08 23:01:55
342

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 4, NO. 2,

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-12 18:21:17
    343Cryptography / Computing / Software / Cryptographic software / Internet protocols / OpenSSL / Cryptographic protocols / Internet Standards / Secure communication / Transport Layer Security / Apache HTTP Server / Application-Layer Protocol Negotiation

    The State of TLS in httpd 2.4 William A. Rowe Jr. Getting Started ●

    Add to Reading List

    Source URL: events.linuxfoundation.org

    Language: English - Date: 2015-10-02 08:34:41
    344Computing / Cryptography / Secure communication / Software / Cryptographic software / Mbed TLS / Cryptographic protocols / Internet protocols / Transport Layer Security / SHA-1 / Cipher suite / ARM Holdings

    PolarSSLverification kit V1.0 Evaluation version –

    Add to Reading List

    Source URL: trust-in-soft.com

    Language: English - Date: 2015-09-11 09:21:10
    345Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

    Application Security Checklist V1.0 Document Audience Application Developers

    Add to Reading List

    Source URL: www.security.uci.edu

    Language: English - Date: 2016-02-23 10:01:01
    346Remote desktop / Remote administration software / Computing / Software / Security / BIOS / Splashtop Remote / Splashtop / Remote desktop software / Computer network security / Secure communication / Health Insurance Portability and Accountability Act

    How Splashtop Helps Support HIPAA Compliance March 2015 Splashtop Inc.

    Add to Reading List

    Source URL: d36wcsykcv5g5l.cloudfront.net

    Language: English - Date: 2015-04-06 14:05:53
    347

    Enabling Secure Location-based Services in Mobile Cloud Computing Di Ma Yan Zhu

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2013-07-18 09:03:34
      348Software / System software / Computing / Cryptographic software / Secure Shell / Ssh-agent / Ssh-keygen / OpenSSH / PuTTY / Comparison of SSH clients / Telnet / Rlogin

      Advanced OpenSSH ! PLUG Jan 2, 2014 Carlos Aguayo

      Add to Reading List

      Source URL: pdxlinux.org

      Language: English - Date: 2014-05-29 15:33:57
      349Computer security / Trusted computing / Windows Vista / Cryptography / Trusted Platform Module / Key management / Volume license key

      KISS: “Key it Simple and Secure” Corporate Key Management Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor CyLab and Carnegie Mellon University, Pittsburgh, Pennsylvania, United States {stephenzhou,

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:14
      350

      Open PhD Position in System Security We are looking for an outstanding PhD candidate to join our Systems Security Group at Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU-Darmstadt to work on

      Add to Reading List

      Source URL: www.cased.de

      Language: English - Date: 2013-02-15 04:08:03
        UPDATE