Secure channel

Results: 85



#Item
81Electronic commerce / Public-key cryptography / Cryptography standards / Hardware security module / Cryptographic primitive / ProVerif / Formal verification / Secure channel / Microsoft CryptoAPI / Cryptography / Cryptographic protocols / Cryptographic software

Prosecco Programming Securely with Cryptography A Project-Team Proposal Karthikeyan Bhargavan

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-03-14 05:31:34
82Electronic engineering / Terminology / Portable media players / Digital video recorders / NTSC / Video signal / PAL / Television / Television technology / Video formats

9 Channel StandAlone Security DVR with 4 Channel Audio Input, 270Fps Real Time Display, PTZ Control, 1000GB HD(Option), DVD-RW(Option), MPEG4 Secure Embedded Linux Operating System Powerful MPEG-4 Hardware Compression Al

Add to Reading List

Source URL: www.e-vcp.com

Language: English - Date: 2009-09-21 14:38:50
83Steganography / Computer network security / NSD / Trusted Computer System Evaluation Criteria / Multilevel security / Bell–LaPadula model / Network security / Mediation / Overt channel / Computer security / Security / Covert channel

A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:44:02
84Virtual machines / Hypervisor / Bell–LaPadula model / Hyper-V / VM / Xen / Biba Model / Trusted Computer System Evaluation Criteria / Covert channel / System software / Computing / Software

Secure Hypervisors Sebastian Vogl Fakult¨

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2009-10-05 06:46:18
85National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Multilevel security / Mandatory access control / Principle of least privilege / Covert channel / Secure Computing / Computer security / Software quality / Evaluation

Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
UPDATE