Network Security

Results: 23614



#Item
31

Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

Add to Reading List

Source URL: scalingbitcoin.org

Language: English - Date: 2016-10-08 10:07:33
    32

    Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

    Add to Reading List

    Source URL: www.pre-secure.com

    Language: English - Date: 2002-11-01 16:30:46
      33

      Out of the Dark: UI Redressing and Trustworthy Events Marcus Niemietz, J¨org Schwenk Horst G¨ ortz Institute for IT Security Chair for Network and Data Security

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2017-11-03 08:02:27
        34

        Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

        Add to Reading List

        Source URL: people.cs.vt.edu

        Language: English - Date: 2016-09-27 09:25:21
          35

          FinCEN Director’s Law Enforcement Awards Program Recognizes Significance of BSA Reporting by Financial Institutions Category: Transnational Security Threat The Financial Crimes Enforcement Network (FinCEN) holds an ann

          Add to Reading List

          Source URL: www.fincen.gov

          Language: English - Date: 2018-07-13 16:46:22
            36

            WEBTRUST® FOR CERTIFICATION AUTHORITIES WEBTRUST PRINCIPLES AND CRITERIA FOR CERTIFICATION AUTHORITIES – SSL BASELINE WITH NETWORK SECURITY Version 2.2 Release Date

            Add to Reading List

            Source URL: www.webtrust.org

            Language: English - Date: 2017-07-31 09:55:37
              37

              ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson Adam Barth

              Add to Reading List

              Source URL: www.adambarth.com

              Language: English - Date: 2008-03-10 01:14:20
                38

                ACNS’08 6th International Conference on Applied Cryptography and Network Security 3~6 June 2008, N. York

                Add to Reading List

                Source URL: acns2008.cs.columbia.edu

                Language: English - Date: 2008-04-22 13:49:58
                  39

                  Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 3 February 23, 2015

                  Add to Reading List

                  Source URL: courses.csail.mit.edu

                  Language: English
                    40

                    Minimum Requirements for the Security of Computerized Records of Health and Social Services Network Clients April 1992

                    Add to Reading List

                    Source URL: www.cai.gouv.qc.ca

                    Language: English - Date: 2012-05-01 19:10:30
                      UPDATE