Secure Computing

Results: 5296



#Item
751Data types / Type theory / Stack / Subroutine / Constructor / Constant / Variable / C / Linked list / Software engineering / Computer programming / Computing

Safe and Secure Software An Invitation to Ada

Add to Reading List

Source URL: www.adacore.com

Language: English - Date: 2012-03-22 11:49:11
752IEEE 802 / Wireless sensor network / Synchronization / Clocks / Clock synchronization / Sensor node / IEEE 802.15.4 / Communications protocol / Message authentication code / Technology / Computing / Telecommunications engineering

TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
753Access control / Ring theory / Semiring / Constraint satisfaction / Interoperation / Constraint programming / Ring / Computing / Security / Software engineering

REASONING ABOUT SECURE INTEROPERATION USING SOFT CONSTRAINTS Stefano Bistarelli1,2 , Simon N. Foley3 , Barry O’Sullivan3,4 1 Istituto di Informatica e Telematica, CNR, Pisa, Italy,

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:08:21
754Secure Shell / Daemon / Password / File Transfer Protocol / Authentication / Internet / Computing / Network architecture

Lecture 24: The Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems Lecture Notes on “Computer and Network Security” by Avi Kak () April 27, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-27 11:09:36
755System software / Distributed file system / Network File System / File system / X Window System / Network-Attached Secure Disks / Computing / Software / Network file systems

PDF Document

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2002-04-10 11:29:32
756Secure multi-party computation / Circuit complexity / Circuit / Lookup table / Boolean circuit / Advantage / Randomized algorithm / Blinding / Field-programmable gate array / Theoretical computer science / Applied mathematics / Computational complexity theory

Small, Stupid, and Scalable: Secure Computing with Faerieplay∗ Alexander Iliev Sean W. Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-08 12:53:14
757Network performance / Covert channel / Steganography / Overt channel / Measuring network throughput / Transmission Control Protocol / IPv4 / Network packet / Time to live / Computer architecture / Computing / Network architecture

CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1 Sebastian Zander {} May 21, 2008 Abstract Communication is not necessarily made secure by the use of encryption alone. The mere ex

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2008-05-20 22:39:30
758Intrusion detection system / Content-addressable memory / Computer security / Cyberwarfare / Computer network security / Security / Computing

Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:20:35
759Unix / System administration / Shadow password / Passwd / Home directory / Find / MINIX 3 / Blah / Secure Shell / Computing / System software / Software

The Minix3 Notes ­­ Rahmat M. Samik­Ibrahim ­­ http://rms46.vlsm.orgpdf ­­ revision 09­09­09­06 ­­ 1 (c) 2007­2009 All Rights Reversed, All Wrongs Corrected ­­ Permission is 

Add to Reading List

Source URL: rms46.vlsm.org

Language: English - Date: 2011-02-06 10:26:00
760Private information retrieval / Trusted Computing / Tor / Public-key cryptography / Privacy / Server / Secure multi-party computation / Proxy server / Cryptography / Cryptographic protocols / Internet privacy

Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services? Ali Khoshgozaran and Cyrus Shahabi University of Southern California Department of Computer Science

Add to Reading List

Source URL: infolab.usc.edu

Language: English - Date: 2009-11-05 01:09:05
UPDATE