Secure communication

Results: 3134



#Item
1Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:17
2Best of Both Worlds in Secure Computation, with Low Communication Overhead

Best of Both Worlds in Secure Computation, with Low Communication Overhead

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-08-09 16:19:58
3mySedgwick mySedgwick, our self-service tool, offers clients and consumers convenient, secure online access to real-time claims information, along with configurable features and communication options to meet their needs.

mySedgwick mySedgwick, our self-service tool, offers clients and consumers convenient, secure online access to real-time claims information, along with configurable features and communication options to meet their needs.

Add to Reading List

Source URL: www.sedgwick.com

Language: English - Date: 2018-05-15 17:28:32
    4Secure Communication with Tls

    Secure Communication with Tls

    Add to Reading List

    Source URL: momjian.us

    Language: English - Date: 2018-08-11 09:26:42
      5Equivalence decisions under MiFID II/MiFIR and PSD2 Regulatory Technical Standards on Strong Customer Authentication and Secure Communication

      Equivalence decisions under MiFID II/MiFIR and PSD2 Regulatory Technical Standards on Strong Customer Authentication and Secure Communication

      Add to Reading List

      Source URL: www.europarl.europa.eu

      Language: English - Date: 2018-01-23 10:21:15
        6Minimizing the number of keys for secure communication in a network with colluders Author: Niels Duif Supervisor: Prof. dr. ir. Henk van Tilborg Technische Universiteit Eindhoven

        Minimizing the number of keys for secure communication in a network with colluders Author: Niels Duif Supervisor: Prof. dr. ir. Henk van Tilborg Technische Universiteit Eindhoven

        Add to Reading List

        Source URL: www.nielsduif.nl

        Language: English - Date: 2016-03-15 16:24:16
        7Minimizing the number of keys for secure communication in a network

        Minimizing the number of keys for secure communication in a network

        Add to Reading List

        Source URL: www.nielsduif.nl

        Language: English - Date: 2016-03-15 16:24:16
        8The Price of Low Communication in Secure Multi-Party Computation Juan Garay1 , Yuval Ishai2 , Rafail Ostrovsky3 , and Vassilis Zikas4 1  2

        The Price of Low Communication in Secure Multi-Party Computation Juan Garay1 , Yuval Ishai2 , Rafail Ostrovsky3 , and Vassilis Zikas4 1 2

        Add to Reading List

        Source URL: web.cs.ucla.edu

        Language: English - Date: 2017-11-29 01:25:51
          9Audi Brussels MediaInfo Communication Audi Brussels Andreas Cremer Secrétaire général

          Audi Brussels MediaInfo Communication Audi Brussels Andreas Cremer Secrétaire général

          Add to Reading List

          Source URL: secure-www.audi.de

          - Date: 2018-03-16 11:04:07