Secure Computing

Results: 5296



#Item
1LOGISTICS Workshop participants will: SONIC WORKSHOP OVERVIEW State-of-the-art cloud computing and networks require stateof-the-art methodologies to understand and secure them,

LOGISTICS Workshop participants will: SONIC WORKSHOP OVERVIEW State-of-the-art cloud computing and networks require stateof-the-art methodologies to understand and secure them,

Add to Reading List

Source URL: webedit.cs.cornell.edu

Language: English - Date: 2018-01-23 16:19:19
2E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on  European Multilaterally Secure Computing Base (EMSCB)

E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on European Multilaterally Secure Computing Base (EMSCB)

Add to Reading List

Source URL: www.emscb.de

Language: English - Date: 2011-05-11 05:57:21
3TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 1, NO. 8, AUGUSTTiming Attacks on Access Privacy in Information Centric Networks and Countermeasures

TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 1, NO. 8, AUGUSTTiming Attacks on Access Privacy in Information Centric Networks and Countermeasures

Add to Reading List

Source URL: www.cs.ucf.edu

Language: English - Date: 2017-08-24 12:04:23
    4Internet Access and Computing at the INT Checking email without a local account If all you need is a telnet or secure shell terminal to an outside computer, you can use any available PC without having a local account. Lo

    Internet Access and Computing at the INT Checking email without a local account If all you need is a telnet or secure shell terminal to an outside computer, you can use any available PC without having a local account. Lo

    Add to Reading List

    Source URL: www.int.washington.edu

    Language: English - Date: 2008-02-07 16:48:16
      5CUSTOMER STORY  FireEye solutions secure the future of quantum computing for D-Wave Systems

      CUSTOMER STORY FireEye solutions secure the future of quantum computing for D-Wave Systems

      Add to Reading List

      Source URL: www.fireeye.com

      Language: English - Date: 2018-08-16 05:39:35
        6CVA Memo #138  Sikker: A High-Performance Distributed System Architecture for Secure Service-Oriented Computing  Nicholas McDonald and William J. Dally

        CVA Memo #138 Sikker: A High-Performance Distributed System Architecture for Secure Service-Oriented Computing Nicholas McDonald and William J. Dally

        Add to Reading List

        Source URL: cva.stanford.edu

        Language: English
          7IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING  1 Improving Security and Performance in the Tor Network through Tunable Path Selection

          IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Improving Security and Performance in the Tor Network through Tunable Path Selection

          Add to Reading List

          Source URL: hatswitch.org

          Language: English - Date: 2017-10-15 12:27:27
            8CVA Memo #137  Sikker: A Distributed System Architecture for Secure High Performance Computing Nicholas McDonald

            CVA Memo #137 Sikker: A Distributed System Architecture for Secure High Performance Computing Nicholas McDonald

            Add to Reading List

            Source URL: cva.stanford.edu

            Language: English
              9IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,  VOL. 9, NO. 2,

              IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 2,

              Add to Reading List

              Source URL: people.cs.vt.edu

              Language: English - Date: 2013-03-07 15:15:50