Secure

Results: 29781



#Item
51Cryptography / Transport Layer Security / Internet / Secure communication / Internet Standards / Cryptographic protocols / Internet protocols / TLS acceleration / Public-key cryptography

Flexible Models for Secure Systems Sarah Meiklejohn A creation story Motivating scenario that founded modern cryptography:

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
52Electromagnetism / Transistortransistor logic / Topology / Network topology / Computer network / Electrical engineering / Electronics

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier◦, Petar Tsankov◦, Vincent Lenders, Laurent Vanbever◦, Martin Vechev◦ ◦ ETH Zürich,

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2018-06-15 12:22:06
53Backup software / System software / Utility software / Computing / Backup / Incremental backup / Andrew File System / File system / Remote backup service / Veeam Backup & Replication

Considerations when Choosing a Backup System for AFS® By Kristen J. Webb President and CTO Teradactyl LLC. October 21, 2005 The Andrew File System® has a proven track record as a scalable and secure network file system

Add to Reading List

Source URL: www.teradactyl.com

Language: English
54Computing / Cloud computing / IT infrastructure / Cloud infrastructure / Content delivery networks / Cloud storage / Multimedia / Fastly / Platform as a service / HP Cloud / CDNetworks

White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2018-01-10 14:14:46
55Cryptography / Post-quantum cryptography / Lattice-based cryptography / Models of computation / Homeomorphisms / Homomorphic encryption / Quantum computing / Lattice / Learning with errors / RSA / One-time pad / Quantum circuit

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-10 03:50:18
56Cryptocurrencies / Blockchains / Alternative currencies / Economy / Computing / Concurrent computing / Ethereum / Decentralization / Bitcoin / Smart contract / Kin / Counterparty

EN D-TO-EN D BLOCKCHAIN SOLUTIONS BUILDING A SECURE, SCALABLE, AND INTEROPERABLE ECOSYSTEM www.komodoplatform.com

Add to Reading List

Source URL: trello-attachments.s3.amazonaws.com

Language: English - Date: 2018-07-17 15:36:50
57Cryptography / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Key management / Secure communication / HTTPS / Public key certificate / Public key infrastructure / Certificate authority / X.509 / TLS acceleration

Get to HTTPS faster, at enterprise scale Platform TLS helps you build trust with users and automate certificate management TLS termination at the edge, on a single, secure network

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2018-09-10 17:44:13
58Cryptography / Public-key cryptography / Secret sharing / Secure multi-party computation / Cryptographic protocol / Ivan Damgrd

Cambridge University Press3 - Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgård and Jesper Buus Nielsen Table of Contents More information

Add to Reading List

Source URL: users-cs.au.dk

Language: English - Date: 2016-04-21 06:42:55
59Computing / Internet architecture / Network architecture / Information and communications technology / Routing / Computer networking / Internet protocols / Border Gateway Protocol / IP routing / Route reflector / Open Shortest Path First / Router

A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-10-14 18:59:05
60Computer security / Antivirus software / Computing / Technology / Computer network security / Mobile device management / Bring your own device / Comodo Group / Mobile security / Endpoint security / Microsoft Intune / Comodo Mobile Security

Data Sheet Comodo Mobile Device Management Secure and centrally manage large-scale deployments of corporate and personal mobile devices Key Benefits

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2018-09-21 10:15:41
UPDATE