Secure communication

Results: 3134



#Item
61How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
62Security Guide  Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2016-08-08 05:14:20
63OpenVas Vulnerability Report  HackerTarget.com OpenVas Vulnerability Report HackerTarget.com

OpenVas Vulnerability Report HackerTarget.com OpenVas Vulnerability Report HackerTarget.com

Add to Reading List

Source URL: hackertarget.com

Language: English - Date: 2015-12-08 04:52:50
64Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
65Microsoft PowerPoint - preneel_isse15_v1.pptx

Microsoft PowerPoint - preneel_isse15_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2015-11-15 11:53:49
66SHINING A LIGHT ON THE DARK WEB AN IN TELLIAGG REPORT: 2016

SHINING A LIGHT ON THE DARK WEB AN IN TELLIAGG REPORT: 2016

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2016-04-08 17:33:42
67Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track  T. Dierks

Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:49
68the importance of layered security_fin-01

the importance of layered security_fin-01

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
69TLS 1.3: A Collision of Implementation, Standards, and Cryptography Eric Rescorla Mozilla

TLS 1.3: A Collision of Implementation, Standards, and Cryptography Eric Rescorla Mozilla

Add to Reading List

Source URL: www.cryptoexperts.com

Language: English - Date: 2016-05-30 09:49:30
70Energy Efficient Schemes for Wireless Sensor Networks with Multiple Mobile Base Station Sameer Muftah Amar Asayh Department of Electronics and Communication J.K Institute of Applied Physics and Technology University of A

Energy Efficient Schemes for Wireless Sensor Networks with Multiple Mobile Base Station Sameer Muftah Amar Asayh Department of Electronics and Communication J.K Institute of Applied Physics and Technology University of A

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-08 00:09:30