Secure communication

Results: 3134



#Item
331Security / Prevention / Computer security / Safety / Data security / Secure communication / Computer law / Security breach notification laws / Computer security incident management / Data breach / Security information and event management / Breach

Data Breach Response Readiness: Is Your Organization Prepared?

Add to Reading List

Source URL: www.huschblackwell.com

Language: English
332Computing / Cryptography / Distributed data storage / File sharing / Software / Secure communication / University of Michigan / Vanish / Distributed hash table / Mainline DHT / BitTorrent / Gmail

Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy

Add to Reading List

Source URL: amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
333Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
334

Secure Group Communication Using Robust Contributory Key Agreement Yair Amir Yongdae Kim

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:36
    335Security / Prevention / Secure communication / Computer security / Crime prevention / National security / Audit / Identity management / User Activity Monitoring / Privileged identity management

    Fischer Identity™ Turn Identity Management into a Strategic Advantage Access Termination

    Add to Reading List

    Source URL: www.fischerinternational.com

    Language: English - Date: 2012-05-10 11:22:05
    336Cryptography / Clipper chip / Key escrow / Crypto Wars / Computer security / Escrow / Strong cryptography / Encryption / Secure communication / National Security Agency / Astro / Key

    Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRJuly 6, 2015

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-07-09 08:43:04
    337Computing / Internet / Network architecture / Dark web / Internet Standards / Internet security / Secure communication / Tor / Routing / Proxy server / Low latency / Onion routing

    An Empirical Evaluation of Relay Selection in Tor Chris Wacek Georgetown University Henry Tan Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2012-12-16 11:56:26
    338Internet protocols / Internet security / Internet Standards / Secure communication / World Wide Web / Transport Layer Security / Internet censorship circumvention / SPDY / Telex / Public-key cryptography / Censorship / Tor

    Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2014-03-31 17:22:53
    339Computing / Internet / Dark web / Internet security / Secure communication / Tor / BitTorrent / Internet Relay Chat / Relay / Anonymizer / Overlay network / Peer-to-peer

    Recruiting New Tor Relays with BRAIDS Rob Jansen Nicholas Hopper Yongdae Kim

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2010-08-16 11:42:16
    UPDATE