Secure Computing

Results: 5296



#Item
731Concurrent computing / Data distribution service / Computer security / Data security / Data center / Cloud computing / Data architecture / Electronic health record / Security service / Data management / Computing / Information technology management

WHITEPAPER Is Your Data Secure? Executive Summary Any organization’s most valuable assets include its digital data. Safeguarding these assets raises questions: which assets require security, and what type of security

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
732Hacker / Phreaking / Voice-mail / Online shopping / Electronics / Computer crimes / Social engineering / Computing / Electronic commerce / Password

Security Tools We take customer’s security as top priority, ensures customer details are stored in secure environments, and password protected to prevent anybody not authorised to obtain details about our customers, fr

Add to Reading List

Source URL: smartbusinesstelecom.com.au

Language: English - Date: 2015-03-10 22:58:27
733Telecommunications engineering / Computing / Signal processing / Estimation theory / Sensor node / Anchor / ANT / Wireless ad-hoc network / Wireless sensor network / Wireless networking / Technology

Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks∗ Cliff Wang U.S. Army Research Office Email:

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
734Cryptography / Computing / Digital signature / Public-key cryptography / Structure / Append / Parity of a permutation / Signature / Sha / Mathematics / Model theory / Universal algebra

Secure Efficient History-Hiding Append-Only Signatures in the Standard Model Benoˆıt Libert Marc Joye

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-31 04:04:52
735Hacking / Computing / Software testing / Vulnerability / Threat / Social vulnerability / Windows / Computer security / Cyberwarfare / Computer network security

Measuring Relative Attack Surfaces Michael Howard, Jon Pincus, and Jeannette M. Wing Abstract— We propose a metric for determining whether one version of a system is more secure than another with respect to a fixed set

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-18 16:33:00
736Cyberwarfare / Cryptographic protocols / Network protocols / Computer network security / Secure communication / HTTP cookie / Session fixation / Session management / Session / Computing / HTTP / Computer security

Improving the Security of Session Management in Web Applications Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium Email: {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
737Internet standards / Data security / Crime prevention / National security / Secure communication / Backup / Computer security / File Transfer Protocol / Server / Financial economics / Computing / Internet

Policy Overview CCR Data Ltd is comprised of management, staff, temporary workers, contractors, investors, shareholders, business partners and will herein be referred to as “CCR”. CCR takes very seriously our Data Se

Add to Reading List

Source URL: www.ccr.co.uk

Language: English - Date: 2014-10-27 13:08:04
738Telecommunications engineering / Sensor node / International Conference on Information Processing in Sensor Networks / TinyOS / Conference on Embedded Networked Sensor Systems / Crossbow Technology / ANT / Wireless sensor network / Technology / Computing

Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge (Demo Abstract) An Liu, Young-Hyun Oh, Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:16
739Software / Remote administration software / Cloud computing / Web desktop / Remote Desktop Protocol / Remote administration / Provisioning / Remote desktop software / Sun Secure Global Desktop / Computing / Remote desktop / System software

Stoneware Inc. webNetwork Whitepaper Stoneware, Inc. Date: November 2010 Related Product: webNetwork

Add to Reading List

Source URL: www.visiria.nl

Language: English - Date: 2012-04-15 15:12:03
740Videotelephony / Computing / Network architecture / Codenomicon / Session Initiation Protocol / IPv4 / IPv6 / SipX / Oulu University Secure Programming Group / Voice over IP / Software testing / Computer network security

 BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere – Mikko Varpiola

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
UPDATE