Secure communication

Results: 3134



#Item
231Decision theory / Nash equilibrium / Game theory / Cryptography / Verifiable secret sharing / Bayesian game

journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

Add to Reading List

Source URL: ogossner.free.fr

Language: English - Date: 2005-10-17 11:53:01
232Computing / Email / Cyberspace / Internet privacy / Secure communication / Opportunistic TLS / Transport Layer Security / Simple Mail Transfer Protocol / Extended SMTP / Email encryption / Opportunistic encryption / Gmail

Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

Add to Reading List

Source URL: zakird.com

Language: English
233Security / Computing / Computer security / Computer network security / Software testing / Cryptography / National security / Secure communication / InfraGard / Vulnerability / QuickTime

The Exploit Intelligence Project Dan Guido NYM InfraGard, https://www.isecpartners.com

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
234Communication design / Marketing / Advertising / Academia / Communication / Sponsor / Asbury Park /  New Jersey / Product placement / TED / Brand

AsburyAgile.com :: 630 Mattison Ave :: Asbury Park, NJDEAR POTENTIAL SPONSOR, We would love to secure your sponsorship for Asbury Agile 2011, the first annual Jersey shore web & technology con

Add to Reading List

Source URL: f.cl.ly

Language: English - Date: 2011-07-26 11:00:44
235Computer access control / Computer security / Cryptography / Access control / FIDO Alliance / Authentication / Strong authentication / Multi-factor authentication / Universal 2nd Factor / Fido Solutions / Password / Security token

Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Regulatory Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PS

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2016-02-05 15:46:07
236Cryptography / Crypto-anarchism / Internet privacy / Mix network / Secure communication / Ciphertext indistinguishability / Message authentication code

Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:59
237Computing / Security / Cloud computing / E-commerce / Secure communication / Crime prevention / National security / Cloud infrastructure / Payment Card Industry Data Security Standard / Threat Stack / Computer security / Stack

SO LU TIO N B RIEF SECURITY SOLUTIONS FOR PCI DSS AND PII The media and publishing industry’s increasing migration to and expansion in the cloud means you’re tasked with minimizing risk and ensuring compliance throu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-02 12:48:42
238Computing / Internet / E-commerce / Secure communication / Transport Layer Security / Proxy server / Load testing

Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.apicasystem.com Release Notes Version 5.4-I

Add to Reading List

Source URL: files.apicasystem.com

Language: English - Date: 2016-03-09 22:25:16
239Cyberwarfare / Computer security / Security / Computer network security / Software testing / Hacking / Cryptography / Secure communication / Vulnerability

Subject: Request to Attend Trail of Bits Training Dear [DECISION MAKER], I would like to request approval to attend a Trail of Bits training course, taking place from [DATES] in [CITY]. The program offers comprehensive,

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:18
240Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
UPDATE