Security architecture

Results: 5312



#Item
291Computing / Internet / Network architecture / Secure communication / Internet Standards / Computer network security / Internet protocols / Internet security / SoftEther VPN / Tor / Transport Layer Security / HTTPS

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-10-05 18:07:52
292

The Design of a Cryptographic Security Architecture Peter Gutmann University of Auckland, Auckland, New Zealand Abstract Traditional security toolkits have concentrated mostly

Add to Reading List

Source URL: www.cs.auckland.ac.nz

Language: English - Date: 1999-07-19 20:40:55
    293

    Smoot Carl-Mitchell Scottsdale, AZ Unix and Network System Architecture, Security and Administration e-mail: Voice: +Cell: +

    Add to Reading List

    Source URL: tic.com

    Language: English - Date: 2004-09-21 19:49:48
      294

      Outline Introduction (Libre)Office security architecture How to Bypass (Libre)Office security How to infect Office documents Demonstrations

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2013-01-19 11:39:55
        295

        Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture Sebastian Vogl and Claudia Eckert {vogls,eckertc}@in.tum.de Chair for IT Security Technische Universität München

        Add to Reading List

        Source URL: www.syssec-project.eu

        Language: English - Date: 2012-04-16 07:03:12
          296Software / Computer architecture / System software / Computing platforms / Smartphones / Cross-platform software / Alphabet Inc. / Android / Linux namespaces / Mobile security / Kernel / Namespace

          PINPOINT: Efficient & Effective Resource Isolation for Mobile Security & Privacy Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Prof. Wenliang (Kevin) Du Department of Electrical Engineering & Computer Science

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-06-05 20:26:09
          297

          MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

          Add to Reading List

          Source URL: www.cisr.us

          Language: English - Date: 2010-03-24 14:46:06
            298Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

            Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

            Add to Reading List

            Source URL: www.strongswan.org

            Language: English - Date: 2006-04-27 10:23:08
            299Enterprise application integration / ISO/IEC 11179 / United States Department of Justice / United States Department of Homeland Security / Java enterprise platform / National Information Exchange Model / Enterprise service bus / SEARCH /  The National Consortium for Justice Information and Statistics / Service-oriented architecture / OJB / GJXDM / Integration platform

            Open Justice Broker Concept Paper Prepared by: Scott Came, SEARCH December 15, 2010 As anyone knows who has tried to do it: Automating justice information flows and integrating justice systems are complex, difficult

            Add to Reading List

            Source URL: www.ojbc.org

            Language: English - Date: 2015-04-15 14:20:55
            300Control engineering / Architecture Analysis & Design Language / Architecture description language / Software architecture / Systems architecture / Resilient control systems / Embedded system / Cyber-physical system / Computer security / Simulink / Networked control system / Control theory

            Towards Synthesis of Platform-aware Attack-Resilient Control Systems ∗ Extended Abstract Miroslav Pajic1

            Add to Reading List

            Source URL: www.georgejpappas.org

            Language: English - Date: 2013-05-22 16:56:10
            UPDATE