Secure Computing

Results: 5296



#Item
1Cloud infrastructure / Cloud computing / Mobile cloud computing

LOGISTICS Workshop participants will: SONIC WORKSHOP OVERVIEW State-of-the-art cloud computing and networks require stateof-the-art methodologies to understand and secure them,

Add to Reading List

Source URL: webedit.cs.cornell.edu

Language: English - Date: 2018-01-23 16:19:19
2Cryptography / Disk encryption / Cryptographic software / Dm-crypt / Symmetric-key algorithm / Comparison of disk encryption software / AES implementations

E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on European Multilaterally Secure Computing Base (EMSCB)

Add to Reading List

Source URL: www.emscb.de

Language: English - Date: 2011-05-11 05:57:21
3

TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 1, NO. 8, AUGUSTTiming Attacks on Access Privacy in Information Centric Networks and Countermeasures

Add to Reading List

Source URL: www.cs.ucf.edu

Language: English - Date: 2017-08-24 12:04:23
    4

    Internet Access and Computing at the INT Checking email without a local account If all you need is a telnet or secure shell terminal to an outside computer, you can use any available PC without having a local account. Lo

    Add to Reading List

    Source URL: www.int.washington.edu

    Language: English - Date: 2008-02-07 16:48:16
      5

      CUSTOMER STORY FireEye solutions secure the future of quantum computing for D-Wave Systems

      Add to Reading List

      Source URL: www.fireeye.com

      Language: English - Date: 2018-08-16 05:39:35
        6

        CVA Memo #138 Sikker: A High-Performance Distributed System Architecture for Secure Service-Oriented Computing Nicholas McDonald and William J. Dally

        Add to Reading List

        Source URL: cva.stanford.edu

        Language: English
          7

          IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Improving Security and Performance in the Tor Network through Tunable Path Selection

          Add to Reading List

          Source URL: hatswitch.org

          Language: English - Date: 2017-10-15 12:27:27
            8

            CVA Memo #137 Sikker: A Distributed System Architecture for Secure High Performance Computing Nicholas McDonald

            Add to Reading List

            Source URL: cva.stanford.edu

            Language: English
              9

              IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 2,

              Add to Reading List

              Source URL: people.cs.vt.edu

              Language: English - Date: 2013-03-07 15:15:50
                UPDATE