Secure transmission

Results: 298



#Item
181Secure multi-party computation / Public key infrastructure / Algorithm / Information privacy / Transmission Control Protocol / Preparer Tax Identification Number / Internet privacy / Cryptography / Cryptographic protocols / Public-key cryptography

A Trusted Execution Platform for Multiparty Computation by Sameer Ajmani Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2002-06-04 13:33:05
182Cryptographic protocols / Secure communication / Networks / Load balancing / Network management / Routing / Multilayer switch / Transmission Control Protocol / HTTP Secure / Computing / Network architecture / Internet

BRIDGING THE GAP FOR APP DELIVERY. A P V S E R I E S D ATA S H E E T APPLICATION DELIVERY CONTROLLERS

Add to Reading List

Source URL: www.arraynetworks.com

Language: English - Date: 2015-01-29 16:32:17
183Information / Fairness measure / Transmission Control Protocol / Computing / Cryptographic protocols / Secure multi-party computation / Data

Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan Garay (Bell Labs) Philip MacKenzie (Bell Labs)

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-29 11:37:55
184Computing / Internet protocols / Secure Shell / OpenSSH / Comparison of SSH servers / Port scanner / Port / Ident / Transmission Control Protocol / System software / Software / Cryptographic software

ScanSSH - Scanning the Internet for SSH Servers∗ Niels Provos Peter Honeyman Center for Information Technology Integration University of Michigan Abstract

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2001-12-14 07:39:12
185Computing / Data / Internet / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / Transmission Control Protocol / Secure communication / Cryptographic protocols / Internet protocols

Internet Engineering Task Force (IETF) Request for Comments: 5746 Updates: 5246, 4366, 4347, 4346, 2246 Category: Standards Track ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-02-12 15:42:25
186Broadband / Data transmission / Internet ethics / Distributed data storage / Internet service provider / Bandwidth cap / Data mining / Routing / Internet privacy / Computing / Internet / Network architecture

Secure Distributed Data-Mining and Its Application to Large-Scale Network Measurements Matthew Roughan Yin Zhang

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-12-08 02:59:54
187Cyberwarfare / Transmission Control Protocol / Networking hardware / Packet Processing / Denial-of-service attack / Server / Internet protocol suite / TCP offload engine / Computing / Computer network security / Computer networking

Network Platform Technology Domain Security Engine Technology for a Dependable, Safe and Secure Network Environment KAMIYA Satoshi, UENO Hiroshi, YAMADA Kenshin, NISHIHARA Motoo

Add to Reading List

Source URL: www.nec.com

Language: English
188Privacy law / Law / Health informatics / Medicine / Protected health information / Medical informatics / Jumbleme / Medical billing / Health / Data privacy / Health Insurance Portability and Accountability Act

Healthcare Policies Overview Sentrion Healthcare Policies work with your information infrastructure to secure protected health information (PHI) against transmission to unauthorized recipients, as required by the Health

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:01
189Internet / Internet standards / OSI protocols / Remote administration software / Transmission Control Protocol / Secure Shell / Telnet / Port / User Datagram Protocol / Internet protocols / Computing / Network architecture

Mosh: An Interactive Remote Shell for Mobile Clients Keith Winstein and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory, Cambridge, Mass. {keithw,hari}@mit.edu Abstract

Add to Reading List

Source URL: mosh.mit.edu

Language: English - Date: 2012-05-07 18:20:09
190Secure two-party computation / Communications protocol / Secret sharing / Transmission Control Protocol / Information-theoretic security / IP / Computational complexity theory / Zero-knowledge proof / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
UPDATE