Secure communication

Results: 3134



#Item
641Computer network security / Secure communication / National security / Identity theft / Data breach / Information security / Internet privacy / Credit card / Privacy / Security / Computer security / Data security

1 Campus Invasion: Security Breaches and Their Trends in Universities Across the U.S. Christopher Cook & Morgan MacBaisey Introduction

Add to Reading List

Source URL: www.ethicapublishing.com

Language: English - Date: 2009-02-01 12:27:46
642Computing / Public-key cryptography / Internet / Security / Internet standards / Transport Layer Security / Buffer overflow / HTTP Secure / Transmission Control Protocol / Cryptographic protocols / Secure communication / Electronic commerce

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:38:52
643Key management / Secure communication / Internet / Electronic commerce / Security / HTTP Secure / Public key certificate / Netscape / Certificate authority / Cryptographic protocols / Public-key cryptography / Computing

Trusted Paths for Browsers ZISHUANG (EILEEN) YE, SEAN SMITH, and DENISE ANTHONY Dartmouth College Computer security protocols usually terminate in a computer; however, the human-based services which they support usually

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:24:00
644Cryptographic protocols / Secure communication / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Hypertext Transfer Protocol / Reverse proxy / Dynamic SSL / Computing / Internet / Network architecture

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T. Lesniewski-Laas S.B., Massachusetts Institute of Technology (2001)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
645Key management / Secure communication / Wireless networking / Security / Technology / Computing / Michael L. Iaccarino / Cryptographic protocols / IEEE 802.11 / CCMP

_____________________________________________________________________________________ _____________________________________________________________________________________ ________________________________________________

Add to Reading List

Source URL: www.ieatraining.com

Language: English - Date: 2012-08-13 15:53:16
646Computer network security / Computing / Cyberwarfare / Data breach / Secure communication / Information security / Data loss / Password / Laptop / Data security / Security / Computer security

Data Breach QuickView An Executive’s Guide to Data Breach Trends in 2012 Sponsored by: Risk Based Security Open Security Foundation

Add to Reading List

Source URL: www.riskbasedsecurity.com

Language: English - Date: 2013-02-11 00:41:35
647Universal Serial Bus / CompactFlash / RS-232 / Secure Digital / Modems / Embedded systems / Computer hardware / Computing / MIDI

Basalt K I N E M E T R I C S High Dynamic Range, IP Aware, Communication Centric Accelerograph

Add to Reading List

Source URL: www.kmi.com

Language: English - Date: 2013-01-10 11:36:50
648Security / Deep packet inspection / Open Travel Alliance / Mass surveillance / Secure communication / Imperva / Check Point / Cisco Systems / Vormetric / Computing / Computer security / Computer network security

RSAC15_South_Hall_11-20-14

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-11-20 15:01:25
649Cryptographic protocols / Secure communication / Internet standards / Data loss prevention software / Transport Layer Security / Cloud computing / Information privacy / Internet privacy / Data security / Computing / Computer security / Internet

DLP-diagram-simplified-v2-vertical

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
650Cryptography / Computing / Secure communication / National security / Computer security / Filesystem-level encryption / Data security / Linoma Software / Encryption / Disk encryption / Security / Cryptographic software

A LINOMA SOFTWARE WHITE PAPER Defending Against Data Breach Developing the Right

Add to Reading List

Source URL: www.cyberdefensemagazine.com

Language: English - Date: 2015-04-28 16:05:41
UPDATE