Secure communication

Results: 3134



#Item
101Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
102Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:14
103Jarrett & Lam Limited The Laurels, 75 Reigate Road, Hookwood, Surrey RH6 0HL www.jarrettandlam.com Terms and Conditions for operating Vacancy Lab on a cloud server or over the internet.

Jarrett & Lam Limited The Laurels, 75 Reigate Road, Hookwood, Surrey RH6 0HL www.jarrettandlam.com Terms and Conditions for operating Vacancy Lab on a cloud server or over the internet.

Add to Reading List

Source URL: www.vacancylab.com

Language: English - Date: 2015-12-18 09:30:09
104FIRST QUARTER RECAPTOP BREACH RECORDS BY SOURCE Malicious insider ( 52% )

FIRST QUARTER RECAPTOP BREACH RECORDS BY SOURCE Malicious insider ( 52% )

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
105The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ?  Carnegi

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
106Appeal: Doc: 37-1 Filed:

Appeal: Doc: 37-1 Filed:

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
107HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet  -

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
108CP-G10i-Flyer-v10.fh-2 [Converted]

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2011-02-28 18:04:53
109COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the OFFICE OF PERSONNEL MANAGEMENT Notice of Submission for Approval: Information Collection; Questionnaire for Public Trust Positions (SF 85P) and Suppl

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the OFFICE OF PERSONNEL MANAGEMENT Notice of Submission for Approval: Information Collection; Questionnaire for Public Trust Positions (SF 85P) and Suppl

Add to Reading List

Source URL: epic.org

Language: English - Date: 2016-05-25 12:49:19
110Taking a Layered Approach to Securing Mobile Devices in the Enterprise When it comes to protecting enterprise data on mobile devices—whether it’s a phone, tablet or a laptop— you need to have layers of security in

Taking a Layered Approach to Securing Mobile Devices in the Enterprise When it comes to protecting enterprise data on mobile devices—whether it’s a phone, tablet or a laptop— you need to have layers of security in

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2016-07-16 06:38:47