Secure communication

Results: 3134



#Item
511Internet protocols / Cryptographic protocols / Internet standards / Public-key cryptography / Key management / Transport Layer Security / Key distribution / Email / Peer-to-peer / Cryptography / Computing / Internet

Scaling Secure Group Communication Systems: Beyond Peer-to-Peer Yair Amir ∗ Cristina Nita-Rotaru ∗ Jonathan Stanton †

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:36
512Computer security / Crime prevention / Electronic commerce / Secure communication / Critical infrastructure protection / National Security Agency / National security / Security / Computer network security

Microsoft Word - ConferenceProgram2012.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English - Date: 2012-03-28 09:18:39
513Computer security / Crime prevention / National security / Secure communication / Computer emergency response team / Crime / Public safety / National Cyber Security Division / Cyber security and countermeasure / Computer crimes / Security / Computer network security

TACKLING CYBER THREATS THROUGH COLLABORATION Surevine specialise in real-time secure information sharing. We design, build and support secure, scalable collaboration environments for the National, Homeland and Cyber Secu

Add to Reading List

Source URL: www.surevine.com

Language: English
514Network performance / Covert channel / Steganography / Overt channel / Measuring network throughput / Transmission Control Protocol / IPv4 / Network packet / Time to live / Computer architecture / Computing / Network architecture

CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1 Sebastian Zander {} May 21, 2008 Abstract Communication is not necessarily made secure by the use of encryption alone. The mere ex

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2008-05-20 22:39:30
515Computing / Data / Internet protocols / Evaluation / Secure Shell / Cipher suite / Common Criteria / HTTP Secure / Blue Coat Systems / Security / Secure communication / Cryptographic protocols

Microsoft Word - Certification Report - Blue Coat

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2015-03-06 05:07:31
516Data / Information / Secure communication / Internet standards / Datagram Transport Layer Security / Handshaking / Transport Layer Security / Internet protocols / Cryptographic protocols / Computing

INTERNATIONAL TELECOMMUNICATION UNION COM 16 – LS 142 – E TELECOMMUNICATION STANDARDIZATION SECTOR

Add to Reading List

Source URL: datatracker.ietf.org

Language: English - Date: 2015-03-04 15:15:03
517Secure communication / Cyberwarfare / Data security / Computing / National security / Information privacy / Data breach / Data at Rest / Information security / Security / Computer network security / Computer security

Defining Security Software Solutions: DataVantage Software & Data Privacy To properly understand the role of DataVantage® software in protecting sensitive information it is best to not only understand what it is but als

Add to Reading List

Source URL: datavantage.com

Language: English - Date: 2013-08-24 12:01:17
518Computer-mediated communication / Email / Secure messaging / Gmail / Google Apps / Google Talk / Instant messaging / Secure communication / Transport Layer Security / Computing / Internet privacy / Internet

Google Message Encryption ABOUT GOOGLE APPS Google Apps is a suite of applications that includes Gmail, Google Calendar (shared calendaring), Google Talk

Add to Reading List

Source URL: www.spaminabox.co.za

Language: English - Date: 2009-06-09 06:29:13
519File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:49:15
520OSI protocols / S/MIME / MIME / DomainKeys Identified Mail / Outlook Express / Secure messaging / Anti-spam techniques / Email / Computing / Computer-mediated communication

1 Towards Usefully Secure Email Chris Masone and Sean Smith Department of Computer Science Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-01-31 11:21:21
UPDATE