Secure communication

Results: 3134



#Item
51Security / Computing / Prevention / Secure communication / Data security / Crime prevention / Cryptography / National security / Trustwave Holdings / Data breach / Computer security / Cyber-Insurance

Reprinted with permission from the October 2015 issue Cybercrimes And The Threat To Lender Data How stronger security and response plans can protect lenders from a data breach. By Lee Brodsky

Add to Reading List

Source URL: www.mortgagebankinginsurance.com

Language: English - Date: 2015-11-12 13:58:00
52E-commerce / Security / Cryptography / Computer network security / Computer security / National security / Secure communication / RSA

2016 Editorial Calendar Month Featured Topic Editorial Details

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-05-24 14:49:01
53Computing / Cryptography / Internet / Internet privacy / Secure communication / Anonymous remailer / Crypto-anarchism / Pseudonymity / Anonymity / Mix network / Traffic analysis / Tor

Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:32:00
54Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / ISO standards / Ubiquitous computing / Paillier cryptosystem / EZ-Link / Homomorphic encryption / HTTPS / Internet privacy / Advanced Card Systems

Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum Hoon Wei Lim

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-08-28 05:10:21
55Computing / Software / Security / Data management / Cyberwarfare / Secure communication / Computer network security / Computer security / Cryptography / Big data / Git / Data security

Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.ischool.drexel.edu

Language: English - Date: 2014-02-06 12:27:42
56Computing / Computer access control / Computer security / Cryptography / Cryptographic protocols / Hypertext Transfer Protocol / Secure communication / Internet protocols / Transport Layer Security / Digest access authentication / Basic access authentication / Form-based authentication

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
57Computing / Computer access control / Internet protocols / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / OAuth / HTTP cookie / Web portal / HTTPS / World Wide Web / Cross-site scripting

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:49
58Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
59Computing / Cyberwarfare / Computer security / Computer network security / E-commerce / Secure communication / Web application security / Automated threat / OWASP / Vulnerability / Application security / Denial-of-service attack

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-10-23 12:02:35
60Computing / Internet / Secure communication / Network architecture / Information science / Knowledge representation / Technical communication / Tor / Ontology / HTTPS / Internet privacy

Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1 U.S. Naval Research Laboratory

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-03 06:13:52
UPDATE