Secure

Results: 29781



#Item
21Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2018-07-10 02:11:19
22Cryptocurrencies / Cryptography / Economy / Alternative currencies / Computing / Blockchains / Decentralization / Ethereum / Bitcoin / Public key infrastructure / Smart contract / Digital currency

Who Am I? Secure Identity Registration on Distributed Ledgers Sarah Azouvi1 , Mustafa Al-Bassam1 , and Sarah Meiklejohn1 University College London {sarah.azouvi.13,mustafa.al-bassam.16,s.meiklejohn}@ucl.ac.uk

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
23

Session A1: Multi-Party Computation 1 CCS’17, October 30-November 3, 2017, Dallas, TX, USA Global-Scale Secure Multiparty Computation Xiao Wang

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
    24Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field

    Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-06-09 02:13:24
    25Cloud computing / Computing / Free software / Cloud infrastructure / Web services / Kubernetes / SUSE Linux / Google Cloud Platform / OpenStack / SUSE / Red Hat software / Container Linux by CoreOS

    What’s New with SUSE CaaS Platform 3? SUSE CaaS Platform 3 continues to deliver rapid advancements, with expanded options for cluster optimization, support for more efficient and secure container image management, and

    Add to Reading List

    Source URL: www.suse.com

    Language: English - Date: 2018-08-03 08:52:45
    26

    Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

    Add to Reading List

    Source URL: acmccs.github.io

    Language: English - Date: 2017-12-30 21:51:58
      27Computing / Information and communications technology / Technology / Mobile computers / Computer networking / Bluetooth / Wireless / Ubiquitous computing / Cloud computing / Smart device / Internet of things / Smart card

      Go for secure adherence monitoring. Digital solution provides secure end-to-end smart device integration to access therapy-relevant data. Standardised web-based integration point simplifies access to therapy-relevant d

      Add to Reading List

      Source URL: yds.ypsomed.com

      Language: English - Date: 2018-09-19 06:46:32
      28Cryptography / Mathematics / Polynomials / Multivariate cryptography / Algebra / Pseudorandom number generator / Computer algebra / Hidden Field Equations / QUAD / Field extension / Cryptographically secure pseudorandom number generator / Mersenne Twister

      Secure PRNGs from Specialized Polynomial Maps over Any Fq Feng-Hao Liu1 , Chi-Jen Lu2 , and Bo-Yin Yang2 1 Department of Computer Science, Brown University, Providence RI, USA

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2012-03-10 01:26:44
      29Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

      NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

      Add to Reading List

      Source URL: vanbever.eu

      Language: English
      30Cloud infrastructure / Cloud computing / Mobile cloud computing

      LOGISTICS Workshop participants will: SONIC WORKSHOP OVERVIEW State-of-the-art cloud computing and networks require stateof-the-art methodologies to understand and secure them,

      Add to Reading List

      Source URL: webedit.cs.cornell.edu

      Language: English - Date: 2018-01-23 16:19:19
      UPDATE