Security engineering

Results: 11317



#Item
611Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2007-07-26 16:56:51
612

H-Prize H-Prize authorized in the Energy Independence and Security Act (EISA) of 2007 to complement DOE sponsored R&D, encourage innovation and reward outstanding science and engineering advancements. • Goals: Encoura

Add to Reading List

Source URL: hpath.org

Language: English
    613Technische Universitt Darmstadt / Ubiquitous computing / Center for Advanced Security Research Darmstadt / Engineering / Smart environment / Mhlhuser / Technology / Real estate / Telecooperation Office

    10 Years Telecooperation at TU Darmstadt 25 Years Telecooperation Research

    Add to Reading List

    Source URL: www.tk.informatik.tu-darmstadt.de

    Language: English - Date: 2011-11-29 07:20:34
    614

    Supplemental Readings CMSC-443 Cryptology, Alan T. Sherman, Spring 2011, UMBC Anderson, Ross, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley (2008), second edition. ISBN6

    Add to Reading List

    Source URL: www.cisa.umbc.edu

    Language: English - Date: 2012-01-12 23:51:11
      615

      Trustwave Leverages OEM Partnerships to Deepen SIEM Market Penetration Accelerated launch of new security appliances delivers revenue growth with assist from UNICOM Engineering and Dell OEM Solutions

      Add to Reading List

      Source URL: www.unicomengineering.com

      Language: English - Date: 2013-12-05 10:30:04
        616Software / System software / Computing / System administration / Identity management / Windows Vista / Computer access control / Computer security / Runas / PowerShell / User Account Control / Keyfile

        Bob McCoy Radio Engineering Industries, Inc.

        Add to Reading List

        Source URL: www.nebraskacert.org

        Language: English - Date: 2013-02-16 09:25:54
        617Transport Layer Security / Cryptographic protocols / Cryptographic software / Secure communication / Internet security / OpenSSL / Heartbleed / Comparison of TLS implementations / Mbed TLS / Cipher suite / HTTPS / POODLE

        Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation David Kaloper-Merˇsinjak† , Hannes Mehnert† , Anil Madhavapeddy and Peter Sewell University of Cambridge Comput

        Add to Reading List

        Source URL: anil.recoil.org

        Language: English - Date: 2015-07-05 12:54:07
        618

        The IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom2014)& The IEEE International Conference on Big Data Science and Engineering (BDSE24th-26th September, B

        Add to Reading List

        Source URL: www.greenorbs.org

        Language: English - Date: 2014-09-23 21:37:25
          619Computing / Systems engineering / Technology / Software / Middleware / Database / Open standard / Internet security / Provisioning / Oracle Corporation / Message-oriented middleware / Storage security

          Microsoft Word - IAO 12Feb07.doc

          Add to Reading List

          Source URL: www.it.vt.edu

          Language: English - Date: 2013-02-07 15:13:17
          620

          How to spend it: optimal investment for cyber security Fabrizio Smeraldi, Pasquale Malacaria School of Electronic Engineering and Computer Science Queen Mary University of London London, UK {f.smeraldi,p.malacaria}@qmul.

          Add to Reading List

          Source URL: www.eecs.qmul.ac.uk

          Language: English - Date: 2014-03-07 08:09:05
            UPDATE