software security

Results: 17991



#Item
891Internet privacy / Dark web / Cryptographic software / Secure communication / Crypto-anarchism / Onion routing / Tor / I2P / Overlay network / Degree of anonymity / Mixminion / Routing

On Building Onion Routing into Future Internet Architectures⋆ Daniele E. Asoni, Chen Chen, David Barrera, and Adrian Perrig Network Security Group Department of Computer Science ETH Z¨urich

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-02-29 10:24:01
892Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Software as a service

SBN-265 FOUNDED 2005 A full-service Information Technology consulting firm with core competencies in custom

Add to Reading List

Source URL: www.sbnonline.com

Language: English - Date: 2016-07-14 10:38:25
893Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Zero-day / IObit

C A S E S T U DY cleverbridge outsmarts malware With Malwarebytes Anti-Malware for Business, the cleverbridge security team proactively prevents malware from getting into the enterprise Business profile

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-07 18:30:53
894Biometrics / EyeVerify / Security / E-commerce / Accounting software / Digital Insight / NCR Corporation / Mobile banking / Authentication / Eye vein verification

Contact: Heather Almand Digital Insight

Add to Reading List

Source URL: www.digitalinsight.com

Language: English - Date: 2015-02-13 14:02:20
895Learning / Prevention / Safety / Internet privacy / Security / Privacy / Facial recognition system / Bystander / Surveillance

I-Pic: A Platform for Privacy-Compliant Image Capture Paarijaat Aditya, Rijurekha Sen and Peter Druschel Max Planck Institute for Software Systems (MPI-SWS) Seong Joon Oh, Rodrigo Benenson, Mario Fritz and Bernt Schiele

Add to Reading List

Source URL: scalable.mpi-inf.mpg.de

Language: English - Date: 2016-05-19 15:03:10
896Software / Computer programming / Procedural programming languages / Object-oriented programming languages / Cross-platform software / Compilers / GNU Compiler Collection / Programming language implementation / Fortran / C / D

The Correctness-Security Gap in Compiler Optimization Vijay D’Silva, Mathias Payer, Dawn Song LangSec 2015 1

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
897Cryptography / Computing / Internet / Transport Layer Security / Internet security / Cryptographic protocols / Secure communication / Cryptographic software / Heartbleed / OpenSSL / StartCom / Codenomicon

The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
898

OT Dubai Service Center certified by UnionPay International Colombes, France, May 31, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and services, today announced that i

Add to Reading List

Source URL: www.oberthur.com

Language: English - Date: 2016-05-31 09:20:41
    899Backup software / Veeam Software / Software / Veeam Backup & Replication / Computing / Information technology / Data security / Business continuity and disaster recovery / CITIC Telecom CPC / Ratmir Timashev

    PARTNER SUCCESS STORY Modern Data Protection Built for Virtualization Veeam Eliminates Backup and Recovery Pain for

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    900Computer access control / Computer security / Access control / Software / YubiKey / One-time password / PIV / Command-line interface

    Yubico PIV Tool Command Line Guide Command Line Reference YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n Yubico PIV Tool Command Line Guide

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-06-14 11:18:50
    UPDATE