Secure Computing

Results: 5296



#Item
81Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / ISO standards / Ubiquitous computing / Paillier cryptosystem / EZ-Link / Homomorphic encryption / HTTPS / Internet privacy / Advanced Card Systems

Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum Hoon Wei Lim

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-08-28 05:10:21
82Computing / Data management / XML databases / Query languages / Database / XQuery / Effi / Data integration / EXist

An Electronic Patient Record “on Steroids”: Distributed, Peer-to-Peer, Secure and Privacy-conscious. Serge Abiteboul1 1 1

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2004-10-20 06:00:00
83Computing / Software / Security / Data management / Cyberwarfare / Secure communication / Computer network security / Computer security / Cryptography / Big data / Git / Data security

Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.ischool.drexel.edu

Language: English - Date: 2014-02-06 12:27:42
84Computing / Network architecture / Computer architecture / Cyberwarfare / Computer network security / Data security / IP multicast / Overlay network / Denial-of-service attack / Anycast / Database trigger / Firewall

Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-06-05 12:41:23
85Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series

Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2015-11-20 16:43:16
86Technology / Business / Intel / Computing / EMV / Cryptography / Intel vPro / Intel AMT versions

Intel® Data Protection Technology for Transactions More Secure Retail Transactions Any Device, Every Time THE ONGOING THREAT

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2015-01-12 09:56:07
87Computing / Computer access control / Computer security / Cryptography / Cryptographic protocols / Hypertext Transfer Protocol / Secure communication / Internet protocols / Transport Layer Security / Digest access authentication / Basic access authentication / Form-based authentication

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
88Computing / Computer access control / Internet protocols / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / OAuth / HTTP cookie / Web portal / HTTPS / World Wide Web / Cross-site scripting

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:49
89Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
90Radio-frequency identification / Automatic identification and data capture / Humancomputer interaction / Privacy / Ubiquitous computing / Wireless / Computing / RFID Journal / Clipped tag / Mobile RFID

TEM Journal–142 An Innovative RFID-Based Solution to Secure Parking Spots for Physically Challenged Sami Miniaoui 1, Enes Sukic 2, Nejdet Doğru 3 1

Add to Reading List

Source URL: www.temjournal.com

Language: English - Date: 2016-05-22 13:04:42
UPDATE