Secure

Results: 29781



#Item
11Computing / Computer architecture / Computer engineering / Computer memory / Computer security / Memory management / Side-channel attacks / Software Guard Extensions / Cold boot attack / C dynamic memory allocation / Sync / Cache

Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves Ofir Weisse Valeria Bertacco Todd Austin University of Michigan oweisse/vale/

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
12Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

Add to Reading List

Source URL: nethide.ethz.ch

Language: English - Date: 2018-07-12 07:50:38
13Cryptography / Multivariate cryptography / Equations / Post-quantum cryptography / Quadratic / RSA / QUAD / Algebraic geometry / Algebraic equation / Elliptic Curve Digital Signature Algorithm / Polynomial

A More Secure and Efficacious TTS Signature Scheme   Jiun-Ming Chen and Bo-Yin Yang

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:34
14Software engineering / Computer programming / Computing / High-level programming languages / Functional languages / Cross-platform software / Scripting languages / JavaScript / Web programming / Scope / Eval / C Sharp

Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. Mitchell

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
15Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

Add to Reading List

Source URL: nsg.romeier.ch

Language: English - Date: 2018-07-10 02:11:19
16Computing / Internet / Terms of service / Politics / Transparency report / Hotspot Shield / Internet privacy / AnchorFree / Tor / E-government

AnchorFree Transparency Report November 29, 2017 AnchorFree is committed to providing users with a private and secure web browsing environment. We are also committed to transparency regarding what information we share wi

Add to Reading List

Source URL: www.hotspotshield.com

Language: English - Date: 2018-10-25 14:22:33
17Algebra / Mathematics / Linear algebra / Unbalanced Oil and Vinegar / Kernel / Quadratic form / Rank / Eigenvalues and eigenvectors / Linear map / Matrix / Hidden Field Equations

Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS Bo-Yin Yang1 and Jiun-Ming Chen2 1 Dept. of Mathematics, Tamkang University, Tamsui, Taiwan

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:43
18Cryptography / Public-key cryptography / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Cryptographic protocol / RSA / Ciphertext indistinguishability / Encryption / Chosen-ciphertext attack / Block cipher

Four Round Secure Computation without Setup Zvika Brakerski1,? and Shai Halevi2,?? and Antigoni Polychroniadou3,? ? ? 1 Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-10 16:45:59
19Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

Add to Reading List

Source URL: www.vanbever.eu

Language: English
20Internet architecture / Computing / Information and communications technology / Network architecture / Routing / IP routing / Computer network / Router / Source routing / Wireless ad hoc network / Control plane / Link-state routing protocol

Toward a Taxonomy and Attacker Model for Secure Routing Protocols Matthias Hollick Cristina Nita-Rotaru

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
UPDATE