Secure communication

Results: 3134



#Item
101Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
102Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:14
103Computing / Internet / E-commerce / Internet security / Secure communication / Transport Layer Security / Server / Network architecture

Jarrett & Lam Limited The Laurels, 75 Reigate Road, Hookwood, Surrey RH6 0HL www.jarrettandlam.com Terms and Conditions for operating Vacancy Lab on a cloud server or over the internet.

Add to Reading List

Source URL: www.vacancylab.com

Language: English - Date: 2015-12-18 09:30:09
104Security / Secure communication / Prevention / Data security / Data breach / Identity theft / SafeNet / Computer security / Personal Data Privacy and Security Act

FIRST QUARTER RECAPTOP BREACH RECORDS BY SOURCE Malicious insider ( 52% )

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
105Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
106Cryptography / Computing / Security / Public key infrastructure / Privacy of telecommunications / E-commerce / Secure communication / Lavabit / Email encryption / Transport Layer Security / Public-key cryptography / Encryption

Appeal: Doc: 37-1 Filed:

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
107Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
108Broadband / Telecommunications equipment / Technology / Telephony / Secure communication / Broadband Global Area Network / Thuraya / Inmarsat / Subscriber identity module / Voice over IP / Crypto phone / Wireless LAN

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2011-02-28 18:04:53
109Security / Government / Data security / Privacy / Identity documents / Secure communication / National security / United States Office of Personnel Management / Marc Rotenberg / Data breach / Katherine Archuleta / Personally identifiable information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the OFFICE OF PERSONNEL MANAGEMENT Notice of Submission for Approval: Information Collection; Questionnaire for Public Trust Positions (SF 85P) and Suppl

Add to Reading List

Source URL: epic.org

Language: English - Date: 2016-05-25 12:49:19
110Security / Computing / Computer security / Computer network security / Cryptography / Cyberwarfare / National security / Secure communication / Layered security / Mobile device management / Mobile workspace

Taking a Layered Approach to Securing Mobile Devices in the Enterprise When it comes to protecting enterprise data on mobile devices—whether it’s a phone, tablet or a laptop— you need to have layers of security in

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2016-07-16 06:38:47
UPDATE