Secure Computing

Results: 5296



#Item
851Grid computing / World Community Grid / IBM / Computing / Concurrent computing / Technology

0707_grid_for_kids_hires_rev_03172014

Add to Reading List

Source URL: secure.worldcommunitygrid.org

Language: English - Date: 2014-03-27 19:03:37
852WebSocket / Tor / Secure communication / Proxy server / Internet censorship circumvention / Internet privacy / Computing / Internet

Evading Censorship with Browser-Based Proxies David Fifield1 , Nate Hardison1 , Jonathan Ellithorpe1 , Emily Stark2 , Dan Boneh1 , Roger Dingledine3 , and Phil Porras4 1 2

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2012-05-01 13:41:51
853Secure communication / Network architecture / Internet standards / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / URI scheme / Opportunistic encryption / Internet / Computing / Cryptographic protocols

GSM Association Official Document WWG.04 - Network Management of Encrypted Traffic Non-confidential Network Management of Encrypted Traffic

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2015-03-10 07:01:32
854Computing / Cryptography / Secure communication / Computer network security / Internet protocols / Transport Layer Security / Basic access authentication / Authentication / HTTP Secure / Security / Cryptographic protocols / HTTP

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-12-11 10:20:06
855Wireless networking / Wireless sensor network / Internet broadcasting / Multicast / Routing / Secure multicast / Topology control / Wireless ad-hoc network / Key distribution / Network architecture / Internet / Computing

SJNW604-11-NO00006057.tex

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2007-10-10 03:13:29
856Security / Secure communication / Data / HTTP Secure / Hypertext Transfer Protocol / Session / World Wide Web / Two-factor authentication / Cross-site request forgery / Computing / HTTP / Cryptographic protocols

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.3

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2014-05-11 17:31:12
857Remote desktop / Remote Desktop Services / Secure Shell / X Window System / Server / Unix / HOB GmbH & Co KG / Virtual Network Computing / Comparison of remote desktop software / Software / System software / Computing

HOB X11Gate Administration Guide

Add to Reading List

Source URL: www.hob.de

Language: English - Date: 2014-12-03 04:35:58
858Documents / Information science / Copy / Secure Digital / Serial port / Computing / Software / System software

AntiLogReader Command Line Application User Guide DOC/AntiLog/UG/2006004_1.1 23-Sep-2006

Add to Reading List

Source URL: www.zen30649.zen.co.uk

Language: English - Date: 2008-04-22 18:21:54
859TransferJet / Telecommunications engineering / Wireless / Secure Digital / Personal digital assistant / Memory card / Technology / Computing / Interfaces

SD ASSOCIATION EXPANDS iSDIO SPECIFICATION, ADDS HIGH-SPEED CONTACTLESS DATA TRANSFER WITH TRANSFERJET New iSDIO memory cards to feature fast contactless transfers between equipped devices PHOTOKINA and SAN RAMON, Calif.

Add to Reading List

Source URL: www.sdcard.org

Language: English - Date: 2014-09-29 12:21:00
860Distributed computing / Cloud storage / Digital television / Internet broadcasting / Internet television / Internet access / Streaming media / Concurrent computing / Computing / Broadband

Internet and Network Services The PSAV High Speed Advantage PSAVĀ® recognizes the time and budget your organization dedicates toward events. Offering fast, reliable and secure connections enables PSAV to provide customer

Add to Reading List

Source URL: www.parc55hotel.com

Language: English - Date: 2015-04-27 06:29:19
UPDATE