Secure Computing

Results: 5296



#Item
471Internet standards / Tunneling protocols / Network protocols / Computer networking / Multiprotocol Label Switching / Ethernet / Packet switching / Label switching / Voice over IP / Network architecture / Computing / Computer architecture

NG 911 & Consolidation: The Future of your PSAP This easy to read guide was designed to give you a full understanding of the mechanics behind using MPLS technology to build a secure and stable PSAP of tomorrow, today. Th

Add to Reading List

Source URL: www.alertpss.com

Language: English - Date: 2013-06-04 08:07:33
472Abstract data types / Electronic engineering / Stack / Computational complexity theory / Circuit / Electronic circuit / Secure multi-party computation / Boolean circuit / Lookup table / Computing / Theoretical computer science / Electronics

2013 IEEE Symposium on Security and Privacy Circuit Structures for Improving Efficiency of Security and Privacy Tools Samee Zahur and David Evans University of Virginia [samee, evans]@virginia.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:51
473Computing / Alberta Electric System Operator / Key management / Cryptographic protocols / Public key certificate / HTTP Secure / Email / Uniform resource identifier / Adams / URI schemes / Internet / Public-key cryptography

May 6, 2010 To: Market Participants and Other Interested Parties Re: Security certificate and new URL for the Automated Dispatch and Messaging System (ADaMS) On Tuesday, June 1, 2010, the Alberta Electric System Operato

Add to Reading List

Source URL: www.aeso.ca

Language: English - Date: 2010-05-06 18:59:24
474Scheduling algorithms / Operations research / Planning / Scheduling / Thread / Parallel computing / Information flow / Lock / Actor model / Computing / Concurrent computing / Concurrency

2011 IEEE Symposium on Security and Privacy Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach Vineeth Kashyap

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-10 18:07:04
475Computer hardware / Software / Android / Nexus One / Samsung Galaxy S / Secure Digital / HTC Desire S / HTC Desire / Universal Serial Bus / Smartphones / Android devices / Computing

Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-25 04:32:40
476Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2012-12-19 05:32:22
477Computer security / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Deep packet inspection / Secure Shell / Sliding window protocol / Port knocking / Deep content inspection / Computer network security / Computing / Cyberwarfare

Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
478Check Point Abra / Security and safety features new to Windows Vista / Computing / Computer network security / Portable Document Format

WhitePaper FileOpen for Corporate Enterprise Rights Management (ERM) Goal: to control access to documents based on user credentials, both inside and outside the corporate firewall. Corporations clearly need to secure pr

Add to Reading List

Source URL: www.actino.com

Language: English - Date: 2013-04-03 09:57:39
479Digital media / Privacy / Identity management / Social issues / Web 2.0 / HTTP cookie / Online shopping / Email / Google Analytics / Computing / Internet / Internet privacy

CATAWIKI PRIVACY POLICY version datedCatawiki takes your privacy very seriously and will process and use information about you in a secure manner. This document sets out the privacy policy of Catawiki (herein

Add to Reading List

Source URL: auction.catawiki.co.uk

Language: English - Date: 2013-11-27 17:06:02
480Grid computing / GLite / Middleware / Vulnerability / Voms / Secure coding / Defensive programming / Computing / Computer security / Cyberwarfare

Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch Elisa Heymann

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2012-11-01 12:06:00
UPDATE