Secure Computing

Results: 5296



#Item
411Mind / Software architecture / Model-based testing / Abstraction / Cross-site scripting / Economic model / Software framework / Software development process / Software engineering / Computing / Software testing

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2013-07-12 10:40:07
412Security engineering / Gates / Wireless / Ubiquitous computing / ISO standards / Electronic lock / Key / Radio-frequency identification / Near field communication / Locksmithing / Technology / Locks

OKIDOKEYS Launches Complete Line of Smart Locks and Keys at the 2014 International CES® OKIDOKEYS enables secure, simple and practical key management to – anytime, anywhere – lock and unlock doors using cell phones,

Add to Reading List

Source URL: www.okidokeys.com

Language: English - Date: 2014-01-08 12:04:11
413Secure communication / Information / Data / Internet protocols / Electronic commerce / HTTP Secure / Electronic voting / JavaScript / X.509 / Cryptographic protocols / Public-key cryptography / Computing

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election J. Alex Halderman1 and Vanessa Teague2? arXiv:1504.05646v2 [cs.CR] 5 Jun 2015

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-06-08 06:10:21
414Tablet computer / USB flash drive / Wi-Fi / Advanced transportation controller / Secure Digital / Computer hardware / Computing / Universal Serial Bus

DATASHEET An unmatched combination of ATC controller

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2014-12-08 13:50:01
415Distributed computing architecture / NoSQL / Structured storage / Cross-platform software / MongoDB / JavaScript / CouchDB / JSON / SQL injection / Computing / Data management / Data

Server-Side JavaScript Injection Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team July 2011  

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:17:10
416Apache Tomcat / Apache JServ Protocol / OpenVMS / Jakarta Project / Web container / Files-11 / Java Servlet / Mod jk / Computing / Java platform / Java enterprise platform

CSWS_JAVA for HP Secure Web Server

Add to Reading List

Source URL: h71000.www7.hp.com

Language: English - Date: 2010-10-05 13:31:36
417HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
418Computing / Routing protocols / Network protocols / IP multicast / Protocol Independent Multicast / Internet standards / Multicast / Secure multicast / Internet Group Management Protocol / Network architecture / Internet / Internet protocols

A Secure Multicast Architecture of Using Host Identity Protocol

Add to Reading List

Source URL: www.eei.edu.cn

Language: English - Date: 2010-10-17 23:11:04
419Internet standards / Software testing / Communications protocol / Data transmission / Protocols / Robustness principle / Len Sassaman / Internet Protocol / Transmission Control Protocol / Computing / Data / Information

SECURE SYSTEMS Editors: Patrick McDaniel, | Sean W. Smith, A Patch for Postel’s Robustness Principle Len Sassaman | Katholieke Universiteit Leuven

Add to Reading List

Source URL: langsec.org

Language: English - Date: 2012-04-12 20:39:00
420

Soha Cloud: Instant Application Security for Enterprise Cloud Computing Environments The Soha Cloud creates a highly secure perimeter around your cloud applications protecting them from breaches, loss, and hijacking, whi

Add to Reading List

Source URL: soha.io

Language: English - Date: 2015-05-22 02:50:04
    UPDATE