Secure Computing

Results: 5296



#Item
361

Open Position Intel Collaborative Research Institute for Secure Computing (ICRI-SC) The traditional computing paradigm is experiencing a fundamental shift: organizations no longer completely control their own data, but

Add to Reading List

Source URL: www.icri-sc.org

Language: English - Date: 2013-10-15 08:44:48
    362

    A web-application architecture for Secure Cloud Computing Provable regulatory compliance!

    Add to Reading List

    Source URL: www.strongauth.com

    Language: English - Date: 2016-02-25 17:41:54
      363Computing / Internet / Network architecture / Dark web / Internet Standards / Internet security / Secure communication / Tor / Routing / Proxy server / Low latency / Onion routing

      An Empirical Evaluation of Relay Selection in Tor Chris Wacek Georgetown University Henry Tan Georgetown University

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2012-12-16 11:56:26
      364Security / Prevention / Computing / Computer network security / Mobile device management / Windows Server / USB flash drive / Password / Security token / Computer security / Server

      SPYRUS Enterprise Management System (SEMS) Secure Control of Portable USB Devices Secure Control of SPYRUS USB Devices security gate has been compromised.

      Add to Reading List

      Source URL: www.spyrus.com

      Language: English - Date: 2015-08-05 12:25:55
      365

      Master Thesis: Automotive Security About the Intel Institute The Intel Collaborative Research Institute for Secure Computing (ICRI-SC) is collaboration between TU Darmstadt, the University of Helsinki, and Intel. The goa

      Add to Reading List

      Source URL: www.icri-sc.org

      Language: English - Date: 2014-01-16 04:28:17
        366Computing / Internet / Dark web / Internet security / Secure communication / Tor / BitTorrent / Internet Relay Chat / Relay / Anonymizer / Overlay network / Peer-to-peer

        Recruiting New Tor Relays with BRAIDS Rob Jansen Nicholas Hopper Yongdae Kim

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2010-08-16 11:42:16
        367Software / Computing / Oracle Database / Oracle Corporation / Database / Oracle Forms / Oracle Application Express

        Oracle security done right. Secure database access on the (unix and linux) operating system level. By Frits Hoogland, VX Company Security is an important part of modern database administration, and is getting even more i

        Add to Reading List

        Source URL: fritshoogland.files.wordpress.com

        Language: English - Date: 2010-01-20 16:35:34
        368

        A Better PC for the Enterprise Virtual PC Center NEC’s Virtual PC Center (VPCC) is a complete desktop virtualization solution that provides a secure computing platform for the enterprise with all the benefits of a cen

        Add to Reading List

        Source URL: fr.nec.com

        Language: English - Date: 2012-12-03 21:09:52
          369

          OPEN POSITIONS Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt The new Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt is jointly operated by In

          Add to Reading List

          Source URL: www.icri-sc.org

          Language: English - Date: 2013-10-15 08:36:02
            UPDATE