Secure communication

Results: 3134



#Item
351Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-04 05:09:56
352Vehicular communication systems / Traffic flow / Traffic / Automobile safety / Automobile / Road traffic safety / Road / National Highway Traffic Safety Administration / Vehicle infrastructure integration / Transport / Land transport / Road transport

The U.S. Department of Transportation (USDOT) is investing in technology that will enable vehicles to communicate with each other and with roads. Through a secure wireless communications network, vehicles will connect—

Add to Reading List

Source URL: www.its.dot.gov

Language: English - Date: 2015-06-08 09:29:54
353Market research / Online chat / Computing / Data collection / Marketing / Internet privacy / Secure messaging / Text messaging / Instant messaging / Research methods / Computer-mediated communication / Science

Pre-Proceedings Version. This paper will appear at Financial CryptoSex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages Franziska Roesner1 , Brian T. Gill2 , and Tadayoshi Kohno1

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-03-22 01:18:53
354Crime prevention / Electronic commerce / National security / Secure communication / Common Criteria / Avionics / Technology / Public safety / Security / Computer network security / Computer security

Michael DULUCQ_CC convergence with Safety Standards in Aeronautics &慭瀻 Space industries

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2011-09-09 11:25:00
355Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-07-21 08:57:56
356Crime prevention / National security / Computer network security / Electronic commerce / Secure communication / Vulnerability / Security / Cyberwarfare / Computer security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-11 06:23:09
357Computer security / Crime prevention / National security / Secure communication / Certification / Cyberwarfare / Computer network security / Security / Electronic commerce

ISA Security Compliance Institute and Wurldtech Partnership October 25, 2010 From ISA Press Release Research Triangle Park, North Carolina, USA (25 October 2010) –The ISA Security Compliance Institute (ISCI) and Wurldt

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
358Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Æ / Linguistics / Cyberwarfare / Security / Computer network security

Microsoft PowerPoint - Dunn_revised+final.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:09
359Cyberwarfare / Computer network security / Computer security / Secure communication / Critical infrastructure protection / National Cyber Security Division / International Cybercrime / National security / Security / United States Department of Homeland Security

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a “Yes”, “No”, “Partial”, or “Not A

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:08:29
360Computer security / Data security / Secure communication / National security / Data breach / Malware / Identity theft / Internet privacy / Personally identifiable information / Security / Computer network security / Cyberwarfare

Hiscox Reinsurance logo

Add to Reading List

Source URL: www.hiscoxbroker.com

Language: English - Date: 2015-07-02 12:19:31
UPDATE