Secure communication

Results: 3134



#Item
271Computing / Software / Statistical classification / Machine learning / Secure communication / Internet privacy / Parts of speech / Tor / Naive Bayes classifier / Deep packet inspection / Supervised learning / Facebook

A Critical Evaluation of Website Fingerprinting Attacks Marc Juarez1 , Sadia Afroz2 , Gunes Acar1 , Claudia Diaz1 , Rachel Greenstadt3 1 KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium

Add to Reading List

Source URL: securehomes.esat.kuleuven.be

Language: English - Date: 2014-10-01 09:30:05
272Cryptography / Theoretical computer science / E-commerce / Secure communication / Model checking / Cryptographic protocol / Public-key cryptography / Communications protocol / Formal methods / Computer security / Secure multi-party computation

Secure Protocols for Secrecy Hanane Houmani and Mohamed Mejri LSFM Research Group Computer Science Department LAVAL University Quebec, Canada

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
273Dark web / Internet security / Secure communication / Tor / Pages / Linux kernel

From: Andrew Lewman, Executive Director To: The Tor Community Date: September 15, 2011 This report documents progress in August 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-09-15 09:57:02
274

Secure Group Communication Using Robust Contributory Key Agreement Yair Amir Yongdae Kim

Add to Reading List

Source URL: homes.cerias.purdue.edu

Language: English - Date: 2003-10-28 11:56:25
    275Software / Computing / Tor / Internet security / Dark web / Secure communication / The Tor Project /  Inc / Firefox / NoScript / Vidalia / Libevent

    From: Andrew Lewman, Executive Director To: the tor community Date: April 10, 2011 This report documents progress in March 2011.

    Add to Reading List

    Source URL: archive.torproject.org

    Language: English - Date: 2011-09-15 09:57:05
    276Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

    Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

    Add to Reading List

    Source URL: aaspring.com

    Language: English - Date: 2015-08-21 16:58:21
    277Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

    Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

    Add to Reading List

    Source URL: aaspring.com

    Language: English - Date: 2015-01-16 19:16:47
    278Tor / Secure communication / Dark web / .onion / Orbot / The Tor Project /  Inc / Firefox / Linux kernel / Mozilla

    From: Andrew Lewman, Executive Director To: the tor community Date: August 10, 2011 This report documents progress in July 2011.

    Add to Reading List

    Source URL: archive.torproject.org

    Language: English - Date: 2011-09-15 09:57:04
    279Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

    Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

    Add to Reading List

    Source URL: people.redhat.com

    Language: English - Date: 2015-09-02 09:27:18
    280Attachment theory / Human development / Interpersonal relationships / Psychoanalysis / Childhood / Secure attachment / Toddler / Separation anxiety disorder / Nonverbal communication / Infant / Attachment disorder / Reactive attachment disorder

    Curriculum Alignment of The Creative Curriculum® for Infants, Toddlers & Twos

    Add to Reading List

    Source URL: teachingstrategies.com

    Language: English - Date: 2014-03-04 15:23:58
    UPDATE