and Security

Results: 171768



#Item
81Theoretical computer science / Quantum information science / Emerging technologies / Physics / Quantum cryptography / Quantum mechanics / Quantum computing / Quantum technology / Quantum information / Quantum network / Pittsburgh Quantum Institute

National Quantum Initiative Act The National Quantum Initiative Act establishes a federal program to accelerate quantum research and development for the United States’ economic and national security. Quantum Informatio

Add to Reading List

Source URL: science.house.gov

Language: English - Date: 2018-06-12 17:38:57
82United States administrative law / Geography of Africa / Government / Africa / 106th United States Congress / African Growth and Opportunity Act / Paperwork Reduction Act / Federal Register / Office of Management and Budget / Zambia

Federal Register / Vol. 66, NoThursday, December 20, Notices 11. Amendments to Chapter XIII OCC proposed and the Commission approved a new Chapter XIII of its rules to govern security futures.9 With the cu

Add to Reading List

Source URL: 34.232.160.87

Language: English - Date: 2002-01-08 15:14:32
83Cryptographic protocols / Electromagnetism / Garbled circuit / Secure multi-party computation / IP / Theory of computation / NC / Electronic circuit / Applied mathematics / Commitment scheme

CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-03-10 13:39:26
84Cryptography / Cryptographic protocols / RC4 / Secure communication / Stream cipher / IEEE 802.11 / Transport Layer Security

All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS Mathy Vanhoef and Frank Piessens, KU Leuven USENIX Security 2015 RC4

Add to Reading List

Source URL: www.rc4nomore.com

Language: English - Date: 2018-09-24 16:02:05
85Software / Computing / Free software / Secure communication / Dark web / Tor / Cryptographic protocols / Internet privacy / .onion / DuckDuckGo / Privacy Badger / Onion routing

Private browsing to stay safe online Online privacy and security: ● No such thing as perfect security and privacy (unless you decide to live completely off the grid). ● Today: some practical ways (i.e. which don’t

Add to Reading List

Source URL: alexanderlhicks.com

Language: English - Date: 2018-09-03 13:30:10
86Marketing / World Wide Web / Terms of service / Computing / Internet privacy / Internet security / Google Analytics / HTTP cookie / Privacy policy / General Data Protection Regulation / Cloudflare / Web analytics

CoinCap.io, CoinCap Apps Online Privacy Notice Data protection and security are important to CoinCap ("CoinCap"; "we"), as is your trust in our company and services. CoinCap is committed to processing your personal data

Add to Reading List

Source URL: static.coincap.io

Language: English - Date: 2018-09-24 22:08:26
87Computer access control / Computer security / Access control / Password / Single sign-on / Security token / Google Authenticator / Self-service password reset / Password manager

Factsheet User self-services Combining efficiency and security Where helpdesks have to deal with large numbers of users, they are often full to capacity with simple, repetitive tasks. User self-services ease the pressu

Add to Reading List

Source URL: www.airlock.com

Language: English - Date: 2016-11-07 04:34:47
88Government / United States intelligence agencies / Executive branch of the United States government / Presidential directive / United States Department of Homeland Security / Homeland security / Terrorism

SeptAdministration of George W. Bush, 2003 Homeland Security Presidential Directive/HSPD–6—Directive on Integration and Use of Screening Information To Protect Against

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2018-07-02 12:33:14
89Computing / Software engineering / Computer programming / Data types / C++ / C / Primitive types / Software bugs / Pointer / Struct / Memory safety / C dynamic memory allocation

Runtime Detection of Temporal Memory Errors? Kostyantyn Vorobyov, Nikolai Kosmatov, Julien Signoles, and Arvid Jakobsson CEA, LIST, Software Reliability and Security Laboratory, PC 174, 91191 Gif-sur-Yvette France {kosty

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:17
90Computing / Technology / Software development / AXA / CAC 40 / DevOps / Application security / Microsoft / M12 / Computer security

Contrast Security Announces Microsoft Ventures and AXA Strategic Ventures as Global Strategic Investors Investments signal criticality of securing software applications in the Cloud and DevOps Los Altos, Calif. — Decem

Add to Reading List

Source URL: www.axavp.com

Language: English - Date: 2018-04-06 05:48:02
UPDATE