Secure Computing

Results: 5296



#Item
721Network file systems / Internet protocols / File system / X Window System / Network File System / NTFS / Inode / Server / Software / System software / Computing

Building secure file systems out of Byzantine storage∗ David Mazieres and Dennis Shasha ` NYU Department of Computer Science {dm,shasha}@cs.nyu.edu

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2006-02-11 17:04:31
722Public-key cryptography / Diffie–Hellman key exchange / Key-agreement protocol / Key management / Virtual synchrony / XTR / Key exchange / Secure channel / SPEKE / Cryptographic protocols / Information / Computing

On the Performance of Group Key Agreement Protocols  Yair Amir 

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
723Cryptographic software / Remote administration software / Portable software / Secure Shell / Telnet / PuTTY / Control key / TtyEmulator / Software / Computing / System software

SSH access to the DIMDI databases

Add to Reading List

Source URL: www.dimdi.de

Language: English - Date: 2015-05-20 03:55:44
724System software / Internet protocols / Internet standards / Network management / NETCONF / YANG / Secure Shell / Configuration management / Filesystem Hierarchy Standard / Computing / Information technology management / System administration

NETCONF and YANG Status, Tutorial, Demo J¨urgen Sch¨onw¨alder 75th IETF 2009, Stockholm,

Add to Reading List

Source URL: www.yang-central.org

Language: English - Date: 2009-10-15 05:05:44
725SharePoint / Microsoft SharePoint / Portal software / Microsoft Search Server / Microsoft SQL Server / Collaborative Application Markup Language / Microsoft Visual Studio / Microsoft Office / Secure Shell / Software / Microsoft / Computing

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2010-12-25 07:10:24
726Data types / Embedded systems / Memory management / Pointer / C / Watchdog timer / Vulnerability / Computing / Software engineering / Computer programming

Watchdog:   Hardware  for  Safe  and  Secure  Manual   Memory  Management  and  Full  Memory  Safety   Santosh  Nagaraka1e,  Milo  M.  K.  Mar8n,  Steve  Zdanc

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-09-24 17:17:58
727Computer network security / Network architecture / Internet privacy / Cyberwarfare / Network performance / Proxy server / Port / Transmission Control Protocol / Secure Shell / Computing / Internet protocols / Internet

Attachment 3 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for NovemberTo General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 86,568 unwanted (one-sided

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:49
728Bandwidth / HTTP Secure / Public key certificate / Email / Web server / X Window System / Be Unlimited / Software / Computing / System software

Minutes of a Board Meeting for the Tau Ceti Co-operative Ltd Held: 11th October 2012 Present: P Grant, D Hook, S Farrugia, A Cosgriff Apologies: T Winters 1.

Add to Reading List

Source URL: www.tauceti.org.au

Language: English - Date: 2012-11-26 06:42:18
729Tree / Wireless sensor network / Computing / Chord / Distributed data storage / Wireless networking / Knowledge representation

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu1 Sanjeev Setia1∗ Sushil Jajodia1,2 1 Center for Secure Information Systems George Mason University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
730Computing / Disk cloning / Acronis True Image / Acronis / Remote backup service / Backup / Acronis Rescue Media / Acronis Secure Zone / Backup software / Software / System software

Table of contents4

Add to Reading List

Source URL: www.acronis.cz

Language: English - Date: 2014-09-26 07:27:50
UPDATE