Secure communication

Results: 3134



#Item
361Crime prevention / National security / Computer network security / Electronic commerce / Secure communication / Malware / Vulnerability / Privacy / Internet privacy / Security / Computer security / Ethics

Agenda Review Process Program Chairs’ Report David Evans University of Virginia

Add to Reading List

Source URL: oakland10.cs.virginia.edu

Language: English - Date: 2010-05-19 11:16:50
362Internet protocols / Secure communication / Cryptography standards / X.509 / Transport Layer Security / PKCS / Common Criteria / Protection Profile / Security Target / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - GSKIT_7d-ST.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
363

HARNESS MOBILE COMMUNICATION & ACHIEVE FINRA COMPLIANCE What is TigerTextPRO? TigerTextPRO for business offers financial institutions secure, controlled text messaging that helps companies in the financial services indus

Add to Reading List

Source URL: www.tigertext.com

Language: English - Date: 2013-11-21 09:02:21
    364Cryptographic software / Email authentication / Email encryption / Encryption / Key disclosure law / Tor / Data security / Telecommunications data retention / Secure communication / Cryptography / Internet privacy / Public-key cryptography

    Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

    Add to Reading List

    Source URL: hrp.law.harvard.edu

    Language: English - Date: 2015-06-16 21:46:00
    365Cyberwarfare / Internet privacy / Cryptographic protocols / Secure communication / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Internet

    Web (In)Security: Remediation Efforts Status and Outlook Jeff Hodges Andy Steingruebl PayPal

    Add to Reading List

    Source URL: kingsmountain.com

    Language: English - Date: 2011-02-22 23:56:14
    366Complexity classes / Probabilistic complexity theory / Zero-knowledge proof / Probabilistically checkable proof / NP / Proof of knowledge / IP / Non-interactive zero-knowledge proof / Soundness / Cryptography / Cryptographic protocols / Theoretical computer science

    Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust† Carmit Hazay‡

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2013-10-04 08:09:02
    367Cloud storage / Concurrent computing / File hosting / Computer file / Inter-process communication / Cloud applications / Accellion /  Inc. / SugarSync / Cloud computing / Computing / Data synchronization

    ON-PREMISES ENTERPRISE FILE SYNC AND SHARE SharePlan meets the most stringent data protection requirements while quickly and easily connecting employees SharePlan is the secure enterprise file sync/share solution deploye

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English - Date: 2015-07-18 18:04:15
    368HTTP / Cryptographic protocols / Internet standards / Secure communication / Email / MIME / Hypertext Transfer Protocol / HTTP Secure / Communications protocol / Computing / Data / Information

    THE MITRE CORPORATION The TAXII HTTP Protocol Binding Specification Version 1.0 Mark Davidson, Charles Schmidt

    Add to Reading List

    Source URL: taxii.mitre.org

    Language: English - Date: 2013-04-30 13:13:27
    369Internet / Internet protocols / Network architecture / Internet standards / Cipher suite / Transport Layer Security / Telex / Proxy server / HTTP Secure / Cryptographic protocols / Secure communication / Computing

    To appear in Proc. 20th Usenix Security Symposium (Usenix Security), AugustFor updates, source code, and an online demonstration, visit https://telex.cc. Telex: Anticensorship in the Network Infrastructure Eric Wu

    Add to Reading List

    Source URL: telex.cc

    Language: English - Date: 2015-03-01 23:33:20
    370Security engineering / Gates / Wireless / Ubiquitous computing / ISO standards / Electronic lock / Key / Radio-frequency identification / Near field communication / Locksmithing / Technology / Locks

    OKIDOKEYS Launches Complete Line of Smart Locks and Keys at the 2014 International CES® OKIDOKEYS enables secure, simple and practical key management to – anytime, anywhere – lock and unlock doors using cell phones,

    Add to Reading List

    Source URL: www.okidokeys.com

    Language: English - Date: 2014-01-08 12:04:11
    UPDATE