Secure Computing

Results: 5296



#Item
591Security / Software quality / Reliability engineering / Dependability / Quality / Fault-tolerant system / Fault-tolerant computer system / Fault / Failure causes / Systems engineering / Computing / Failure

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 1, NO. 1,

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:34
592Onion routing / Tor / Universal composability / Routing / Traffic analysis / Public-key cryptography / Communications protocol / Cryptography / Internet privacy / Computing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-20 11:08:29
593Computing / Centralized computing / Remote desktop / Desktop virtualization / Virtualization / Infrastructure optimization / Thin client / Oracle VDI / Virsto / System software / Software / VMware

Atlantis ILIO for the VMware View Mobile Secure Desktop Boost desktop performance from any device while delivering the lowest cost per desktop ATL AN T I S I L I O K E Y B E NE FI TS W ITH V M WA R E V I E W M O BI LE S

Add to Reading List

Source URL: www.atlantiscomputing.com

Language: English - Date: 2015-04-19 19:29:15
594Cyberwarfare / Virtual private network / Internet security / Secure Shell / Transport Layer Security / Cisco Systems VPN Client / UT-VPN / SSL-Explorer: Community Edition / Computer network security / Computing / Computer security

Security Policy for Router

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2011-12-27 05:41:48
595Cloud infrastructure / Cloud storage / Data center / Computer security / Cloud communications / IBM cloud computing / Cloud computing / Computing / Centralized computing

G-Cloud Infrastructureas-a-Service Secure scalable pay as you use cloud services The trusted way to deploy your IT Not all Infrastructure-as-a-Service (IaaS) is the same. As a buyer you should take great care in selectin

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 06:00:04
596IP traceback / Internet / Connectivity / Graph / Topology / Graph theory / Mathematics / Theoretical computer science

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2008-02-01 22:36:45
597Computing / Internet / Network architecture / Transport Layer Security / Cipher suite / Telex / Proxy server / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Internet protocols

Telex: Anticensorship in the Network Infrastructure Eric Wustrow∗ ∗ The Scott Wolchok∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-07-18 09:40:53
598Shared resource / George Boole / Server / Microsoft / Computing / Microsoft SQL Server / Windows Server System

Secure Board The software solution for BODs and Top Management PROTECTED DATA Whenever. Wherever.

Add to Reading List

Source URL: www.booleserver.com

Language: English - Date: 2014-12-10 19:00:00
599Software / Cloud infrastructure / OwnCloud / Cloud.com / Backup / Cloud storage / GlusterFS / Cloud computing / Computing / Network file systems

Universal File Access with Scale-Out Storage Secure and Scalable Universal File Access Your company has data. Lots of it. And your employees want to share it with each other and across a spectrum of mobile devices. Your

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2015-03-06 05:13:42
600Telehealth / Health / NetApp / Computer data storage / Computing / Backup / Inselspital / T-Systems / Technology / Health informatics / Medical imaging / Picture archiving and communication system

inselspital. highly available and secure image data from the internet. At Inselspital in Berne, T-Systems provides doctors with radiology images on their tablets. During visits, doctors call up the patients’ data and

Add to Reading List

Source URL: www.telekom-healthcare.com

Language: English
UPDATE