Secure Computing

Results: 5296



#Item
371Internet standards / Internet / Software / HTTP / Business intelligence / Greenplum / PostgreSQL / Secure Shell / Integrated Windows Authentication / Computing / Computer network security / Internet protocols

GreenplumEMC-Logo-HORZ-TWOCOLOR

Add to Reading List

Source URL: gpdb.docs.pivotal.io

Language: English - Date: 2015-07-09 14:08:00
372Oblivious transfer / Secure multi-party computation / Information-theoretic security / Secret sharing / Distributed computing / Indocrypt / Commitment scheme / Asynchronous system / Cryptography / Cryptographic protocols / Verifiable secret sharing

Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-09-07 07:03:05
373Cluster computing / Hewlett-Packard / OpenVMS / Parallel computing / Apache HTTP Server / Perl / XAMPP / Form / Mod perl / Computing / Software / Cross-platform software

CSWS_PERL for HP Secure Web Server for OpenVMS (based on Apache) Installation Guide and Release Notes November 2005 CSWS_PERL Version 2.1 for OpenVMS Alpha CPQ-AXPVMS-CSWS_PERL-V0201--1.PCSI_SFX_AXPEXE

Add to Reading List

Source URL: h71000.www7.hp.com

Language: English - Date: 2008-03-25 11:36:29
374System administration / Internet protocols / Secure Shell / Password / Two-factor authentication / NX technology / Superuser / Error message / Ident / System software / Software / Computing

Distributed, Stealthy Brute Force Password Guessing Attempts PASSWORDS14, Trondheim 8 December 2014 Peter N. M. Hansteen BSDly.net <>

Add to Reading List

Source URL: home.nuug.no

Language: English - Date: 2014-12-07 08:01:24
375Market research / Online chat / Computing / Data collection / Marketing / Internet privacy / Secure messaging / Text messaging / Instant messaging / Research methods / Computer-mediated communication / Science

Pre-Proceedings Version. This paper will appear at Financial CryptoSex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages Franziska Roesner1 , Brian T. Gill2 , and Tadayoshi Kohno1

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-03-22 01:18:53
376Computing / Coding theory / Error detection and correction / IP multicast / Secure multicast / Transmission Control Protocol / Password authentication protocol / Reed–Solomon error correction / Communications protocol / Information / Data / Internet protocols

Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer Science

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2009-01-20 23:46:12
377Cloud storage / Data center / Data management / Distributed data storage / Networks / TE Data / Voice over IP / Colocation centre / Computing / Concurrent computing / Distributed computing

Minneapolis HIGHLIGHTS Colocation facilities include secure cabinets \

Add to Reading List

Source URL: www.vxchnge.com

Language: English - Date: 2015-05-01 14:53:46
378Philosophy of biology / Homomorphic encryption / Genetic epidemiology / Abstract algebra / Single-nucleotide polymorphism / Genetic association / Genome-wide association study / Cloud computing / Euclidean vector / Biology / Genetics / Cryptography

2015 IEEE CS Security and Privacy Workshops Efficient Secure Outsourcing of Genome-wide Association Studies Wenjie Lu

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:25:06
379Computing / Software testing / Hacking / Vulnerability / Penetration test / Exploit / Threat model / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:36:52
380

The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau Uni

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
    UPDATE