Secure communication

Results: 3134



#Item
71Distributed computing / Secure communication / Verifiable computing / Cloud computing / Institute for Applied Information Processing and Communications / Deliverable

Verifiable Computation Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
72Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
73Economy / Business / Money / E-commerce / Information privacy / Payment cards / Secure communication / Payment systems / Payment Card Industry Data Security Standard / Credit card / Data breach / Payment processor

PRATT’S PRIVACY & CYBERSECURITY LAW REPORT AN A.S. PRATT PUBLICATION MAY 2016 VOL. 2 • NO. 4

Add to Reading List

Source URL: www.privsecblog.com

Language: English - Date: 2016-06-14 14:03:14
74Geography of Florida / Florida / Geography of the United States / Cryptographic protocols / IEEE 802.11 / Key management / Secure communication / Wireless networking / Indian River Lagoon / CCMP / Lagoon / Clean Water Act

P. Owen INTRODUCTION The Need In the Spring and Summer of 2007, the Indian River Lagoon National Estuary Program (IRL NEP) embarked on a process to review and update the core of the 1996 Indian River Lagoon

Add to Reading List

Source URL: www.irlcouncil.com

Language: English - Date: 2016-05-02 14:22:01
75Computing / Network architecture / Internet / Internet privacy / Cryptographic protocols / Computer networking / Hypertext Transfer Protocol / Secure communication / Proxy server / Keystore / Localhost / HTTPS

The TCPSniffer Table of contents 1 Starting the TCPSniffer................................................................................................ 2 2 Using the TCPSniffer as an HTTP proxy........................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:12
76Usability / Humancomputer interaction / Technical communication / Cryptography / Security / Habituation / Authentication / Technology / Fingerprint

Poster: A Framework for Comparative Usability Studies on Secure Device Pairing Achal Channarasappa, Pranita Ramakrishnan, Joshua Tan, Jeremy Thomas Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:31
77Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Transport Layer Security / Internet Standards / HTTPS

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
78Security / Secure communication / Economy / E-commerce / Information privacy / Payment cards / Cryptography / Data breach / Computer security / Payment card industry / Payment terminal / Hackers: Heroes of the Computer Revolution

Small businesses globally are a prime target for cybercriminals. DON’T LEAVE YOUR BUSINESS OPEN TO ATTACK When your payment card data is breached, the fallout can strike quickly.

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-07-06 20:56:33
79Cyberwarfare / Security / Computer security / Cybercrime / Computer network security / Secure communication / Cyber-security regulation / Michigan Cyber Range

OFFICE OF THE GOVERNOR October 2015 National Cyber Security Awareness Technology plays a vital role in our daily lives – California’s citizens,

Add to Reading List

Source URL: cio.ca.gov

Language: English - Date: 2015-10-22 12:53:02
80Security / Prevention / Secure communication / Safety / Data security / Data breach / Security breach notification laws / Identity theft / Computer security

From: To: Cc: Subject: Date:

Add to Reading List

Source URL: ouhsc.edu

Language: English - Date: 2016-04-28 10:00:22
UPDATE