Secure communication

Results: 3134



#Item
71Verifiable Computation Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Verifiable Computation Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
72æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
73PRATT’S PRIVACY & CYBERSECURITY LAW REPORT  AN A.S. PRATT PUBLICATION MAY 2016 VOL. 2 • NO. 4

PRATT’S PRIVACY & CYBERSECURITY LAW REPORT AN A.S. PRATT PUBLICATION MAY 2016 VOL. 2 • NO. 4

Add to Reading List

Source URL: www.privsecblog.com

Language: English - Date: 2016-06-14 14:03:14
74P. Owen  INTRODUCTION The Need In the Spring and Summer of 2007, the Indian River Lagoon National Estuary Program (IRL NEP) embarked on a process to review and update the core of the 1996 Indian River Lagoon

P. Owen INTRODUCTION The Need In the Spring and Summer of 2007, the Indian River Lagoon National Estuary Program (IRL NEP) embarked on a process to review and update the core of the 1996 Indian River Lagoon

Add to Reading List

Source URL: www.irlcouncil.com

Language: English - Date: 2016-05-02 14:22:01
75The TCPSniffer Table of contents 1 Starting the TCPSniffer................................................................................................ 2 2 Using the TCPSniffer as an HTTP proxy........................

The TCPSniffer Table of contents 1 Starting the TCPSniffer................................................................................................ 2 2 Using the TCPSniffer as an HTTP proxy........................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:12
76Poster: A Framework for Comparative Usability Studies on Secure Device Pairing Achal Channarasappa, Pranita Ramakrishnan, Joshua Tan, Jeremy Thomas Carnegie Mellon University Pittsburgh, PA

Poster: A Framework for Comparative Usability Studies on Secure Device Pairing Achal Channarasappa, Pranita Ramakrishnan, Joshua Tan, Jeremy Thomas Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:31
77Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari  Marcelo Bagnulo

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
78Small businesses globally are a prime target for cybercriminals.  DON’T LEAVE YOUR BUSINESS OPEN TO ATTACK When your payment card data is breached, the fallout can strike quickly.

Small businesses globally are a prime target for cybercriminals. DON’T LEAVE YOUR BUSINESS OPEN TO ATTACK When your payment card data is breached, the fallout can strike quickly.

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-07-06 20:56:33
79OFFICE OF THE GOVERNOR  October 2015 National Cyber Security Awareness Technology plays a vital role in our daily lives – California’s citizens,

OFFICE OF THE GOVERNOR October 2015 National Cyber Security Awareness Technology plays a vital role in our daily lives – California’s citizens,

Add to Reading List

Source URL: cio.ca.gov

Language: English - Date: 2015-10-22 12:53:02
80From: To: Cc: Subject: Date:

From: To: Cc: Subject: Date:

Add to Reading List

Source URL: ouhsc.edu

Language: English - Date: 2016-04-28 10:00:22