Secure communication

Results: 3134



#Item
991Cyberwarfare / Computer network security / Data breach / Secure communication / Information security / Computer security / Security / Data security

InfoSec Who, Why, What, When and Where? InfoSec Who is Presenting?

Add to Reading List

Source URL: static.coreapps.net

Language: English - Date: 2015-03-06 15:37:15
992Cryptography / Computer security / Byte / Science / Publishing / Security / Computer network security / Secure communication

Cybersecurity versus human space, and the role of cryptography and security

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2007-03-01 09:39:28
993Bomgar / Networking hardware / System software / Computing / Computer network security / Secure communication / Crossloop / Remote administration software / Remote desktop / Security

BOMGAR FOR FINANCIAL SERVICES SECURE REMOTE SUPPORT FOR FINANCIAL SERVICES SECURE REMOTE

Add to Reading List

Source URL: www.bomgar.com

Language: English - Date: 2014-01-02 17:46:38
994Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / HTTP Secure / Extended Validation Certificate / Public key certificate / Certificate authority / Man-in-the-middle attack / Cryptography / Key management / Public-key cryptography

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 09:17:52
995Computing / Computer-mediated communication / Electronic documents / Metadata / Email / Internet / Internet privacy

SHAZZLEMAIL, PRIVATE AND SECURE EMAIL APPLICATION: PRIVACY AND THE RISKS ASSOCIATED WITH METADATA

Add to Reading List

Source URL: de.shazzlemail.com

Language: English - Date: 2014-04-10 11:33:03
996Cryptographic protocols / Public-key cryptography / Secure communication / Electronic commerce / Key management / HTTP Secure / Transport Layer Security / Man-in-the-middle attack / Proxy server / Cryptography / Computing / Internet

The Minstrel’s Articles SSL: Whom Do You Trust? The Minstrel’s Articles SSL: Whom Do You Trust?

Add to Reading List

Source URL: www.minstrel.org.uk

Language: English - Date: 2014-05-12 04:01:05
997Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Internet of Things / Cloud computing / Cyberwarfare / Computer network security / Computing / Security

KSÖ SECURITY CONGRESS 2015 Adam Philpott Director, EMEAR Cyber Security February 2015 @arphilpott

Add to Reading List

Source URL: www.sicherheitskongress.at

Language: English - Date: 2015-03-03 05:26:41
998Secret sharing / Proactive secret sharing / Threshold cryptosystem / Communications protocol / Information-theoretic security / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 19:43:29
999International nongovernmental organizations / Lattice theory / Lattice-based access control / International Conference on Availability /  Reliability and Security / Multilevel security / Secure communication / Capability-based security / Role-based access control / Mandatory access control / Computer security / Security / Access control

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:35:16
1000System software / Centralized computing / VMware / Cryptographic protocols / Secure communication / HTTP Secure / Desktop virtualization / Remote Desktop Services / Security and safety features new to Windows Vista / Computing / Software / Remote desktop

View Security VMware Horizon 6 Version 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is

Add to Reading List

Source URL: pubs.vmware.com

Language: English
UPDATE