Communications security

Results: 3700



#Item
221Cryptography / Computing / Security / Engineering / SimOS / Computer science / Software testing / Institute for Applied Information Processing and Communications / International Conference on Availability /  Reliability and Security / Computer security / Post-quantum cryptography

Scientific Report First name / Family name Dr. Dimitrios Simos

Add to Reading List

Source URL: fellowship.ercim.eu

Language: English - Date: 2015-04-23 10:01:32
222Computing / Information technology / Cloud infrastructure / Cloud computing / New ICT / Computer security / CompTIA / Information and communications technology / Business and Computing / IEEE Cloud Computing

Higher Diploma in Mobile and Secure Cloud Computing Department of Electronic & Computer Engineering Faculty of Science & Engineering

Add to Reading List

Source URL: www.ece.ul.ie

Language: English - Date: 2015-07-08 10:39:38
223

Federal Communications Commission Office of Engineering and Technology Laboratory Division March 18, 2015 SOFTWARE SECURITY REQUIREMENTS FOR U-NII DEVICES

Add to Reading List

Source URL: assets.documentcloud.org

Language: English - Date: 2015-09-04 09:35:00
    224Computing / Internet / Network architecture / Computer network security / Computer networking / Transmission Control Protocol / Border Gateway Protocol / Router / Internet protocol suite / Packet loss / Firewall / Communications protocol

    Application-Driven TCP Recovery and Non-Stop BGP Robert Surton, Ken Birman, and Robbert van Renesse Department of Computer Science, Cornell University Abstract—Some network protocols tie application state to underlying

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2013-04-22 08:52:17
    225North Texas Food Bank / Brain / Personal life / Food bank / Hunger / Food security / Lubbock /  Texas / Food and drink

    Media Contacts: Mary Myers Communications Manager O: C:

    Add to Reading List

    Source URL: unitedtexas.com

    Language: English - Date: 2015-04-29 16:45:23
    226

    2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation Michael B

    Add to Reading List

    Source URL: www.dcsec.uni-hannover.de

    Language: English - Date: 2012-06-26 09:23:14
      227North Texas Food Bank / Food bank / Hunger / Lubbock /  Texas / Food security / Stamp Out Hunger Food Drive

      Media Contacts: Mary Myers Communications Manager O: C:

      Add to Reading List

      Source URL: unitedtexas.com

      Language: English - Date: 2015-04-29 16:45:23
      228Cryptography / Cryptographic protocols / Public-key cryptography / Internet protocols / DiffieHellman key exchange / NeedhamSchroeder protocol / Communications protocol / Key exchange / Protocol composition logic / Interlock protocol

      Journal of Computer Security–482 IOS Press 423 A derivation system and compositional logic

      Add to Reading List

      Source URL: seclab.stanford.edu

      Language: English - Date: 2010-07-17 01:14:12
      229

      ACM  Digital  Identity  Management  (DIM)  2013   Friday, 8 th November 2013 held in conjunction with the 20th ACM Conference on Computer and Communications Security (ACM CCSContact: acmdim2013@e

      Add to Reading List

      Source URL: cccs.ncl.ac.uk

      Language: English - Date: 2013-07-29 05:02:39
        230Prevention / Security / Safety / National security / Crime prevention / Law enforcement / Human rights / Mass surveillance / Surveillance / Internet privacy / Computer and network surveillance / Privacy

        Union for Democratic Communications: Circuits of Struggle Toronto, ON ABSTRACTS: Friday May:30 am Panel session 1

        Add to Reading List

        Source URL: udc2015.files.wordpress.com

        Language: English - Date: 2015-04-19 22:03:04
        UPDATE