and Security Technologies

Results: 1110



#Item
1Peerio Technologies  Security Design (June 20, 2017) I. Overview Peerio is an application that allows users to store and exchange end-to-end encrypted information in the

Peerio Technologies Security Design (June 20, 2017) I. Overview Peerio is an application that allows users to store and exchange end-to-end encrypted information in the

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2018-07-11 15:11:09
    2Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 G´ abor Lencsea,∗, Youki Kadobayashib a Department

    Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 G´ abor Lencsea,∗, Youki Kadobayashib a Department

    Add to Reading List

    Source URL: www.hit.bme.hu

    Language: English - Date: 2018-04-20 08:10:01
      3Proceedings on Privacy Enhancing Technologies ; ):95–112  Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna  On the Privacy and Security of the

      Proceedings on Privacy Enhancing Technologies ; ):95–112 Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the

      Add to Reading List

      Source URL: petsymposium.org

      Language: English - Date: 2017-10-04 16:18:51
      4Working Paper - Update on Privacy and Security Issues in Internet Telephony (VoIP) and related Communication Technologies (commented OPC)

      Working Paper - Update on Privacy and Security Issues in Internet Telephony (VoIP) and related Communication Technologies (commented OPC)

      Add to Reading List

      Source URL: www.datenschutz-berlin.de

      Language: English - Date: 2017-09-11 03:35:24
        5TRUSTED, VERIFIED AND MORE SECURE ®  All .BANK domain names must meet robust security technologies

        TRUSTED, VERIFIED AND MORE SECURE ® All .BANK domain names must meet robust security technologies

        Add to Reading List

        Source URL: www.register.bank

        Language: English - Date: 2017-01-19 10:40:46
          6Survey of IPv6 Transition Technologies for Security Analysis Gábor LENCSE†,‡, and Youki KADOBAYASHI† †Laboratory for Cyber Resilience, Nara Institute of Science and TechnologyTakayama, Ikoma, Nara, 630-0

          Survey of IPv6 Transition Technologies for Security Analysis Gábor LENCSE†,‡, and Youki KADOBAYASHI† †Laboratory for Cyber Resilience, Nara Institute of Science and TechnologyTakayama, Ikoma, Nara, 630-0

          Add to Reading List

          Source URL: www.hit.bme.hu

          Language: English - Date: 2017-07-18 08:01:06
            7INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA  Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of life of citizens and transformed the way that

            INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of life of citizens and transformed the way that

            Add to Reading List

            Source URL: www.cert.gov.lk

            Language: English - Date: 2018-04-17 05:12:00
              8Proceedings on Privacy Enhancing Technologies ; ):1–18  Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism

              Proceedings on Privacy Enhancing Technologies ; ):1–18 Susan E. McGregor*, Franziska Roesner, and Kelly Caine Individual versus Organizational Computer Security and Privacy Concerns in Journalism

              Add to Reading List

              Source URL: www.franziroesner.com

              Language: English - Date: 2016-06-02 16:32:37
                9Advanced Research and Technology SymposiumJoin a community of academics, students, and entrepreneurs. Hear about groundbreaking new technologies that are being brought to bear to address national security challeng

                Advanced Research and Technology SymposiumJoin a community of academics, students, and entrepreneurs. Hear about groundbreaking new technologies that are being brought to bear to address national security challeng

                Add to Reading List

                Source URL: conferences.ll.mit.edu

                Language: English - Date: 2018-04-30 10:19:12
                  10Colleen M. Swanson travellingcryptographer.com •  Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

                  Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

                  Add to Reading List

                  Source URL: travellingcryptographer.com

                  - Date: 2017-10-03 15:50:40