and Security Technologies

Results: 1110



#Item
1

Peerio Technologies Security Design (June 20, 2017) I. Overview Peerio is an application that allows users to store and exchange end-to-end encrypted information in the

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2018-07-11 15:11:09
    2

    Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 G´ abor Lencsea,∗, Youki Kadobayashib a Department

    Add to Reading List

    Source URL: www.hit.bme.hu

    Language: English - Date: 2018-04-20 08:10:01
      3Computing / Technology / Wireless / Internet privacy / Radio-frequency identification / Bluetooth / Alphabet Inc. / Indoor positioning system / SilverPush / Cross-device tracking / Bluetooth low energy beacon / Android

      Proceedings on Privacy Enhancing Technologies ; ):95–112 Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the

      Add to Reading List

      Source URL: petsymposium.org

      Language: English - Date: 2017-10-04 16:18:51
      4

      Working Paper - Update on Privacy and Security Issues in Internet Telephony (VoIP) and related Communication Technologies (commented OPC)

      Add to Reading List

      Source URL: www.datenschutz-berlin.de

      Language: English - Date: 2017-09-11 03:35:24
        5

        TRUSTED, VERIFIED AND MORE SECURE ® All .BANK domain names must meet robust security technologies

        Add to Reading List

        Source URL: www.register.bank

        Language: English - Date: 2017-01-19 10:40:46
          6

          Survey of IPv6 Transition Technologies for Security Analysis Gábor LENCSE†,‡, and Youki KADOBAYASHI† †Laboratory for Cyber Resilience, Nara Institute of Science and TechnologyTakayama, Ikoma, Nara, 630-0

          Add to Reading List

          Source URL: www.hit.bme.hu

          Language: English - Date: 2017-07-18 08:01:06
            7

            INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of life of citizens and transformed the way that

            Add to Reading List

            Source URL: www.cert.gov.lk

            Language: English - Date: 2018-04-17 05:12:00
              8

              Proceedings on Privacy Enhancing Technologies ; ):1–18 Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism

              Add to Reading List

              Source URL: www.franziroesner.com

              Language: English - Date: 2016-06-02 16:32:37
                9

                Advanced Research and Technology SymposiumJoin a community of academics, students, and entrepreneurs. Hear about groundbreaking new technologies that are being brought to bear to address national security challeng

                Add to Reading List

                Source URL: conferences.ll.mit.edu

                Language: English - Date: 2018-04-30 10:19:12
                  10

                  Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

                  Add to Reading List

                  Source URL: travellingcryptographer.com

                  - Date: 2017-10-03 15:50:40
                    UPDATE