Secure communication

Results: 3134



#Item
931Crime prevention / Electronic commerce / National security / Secure communication / Malware / Password / FUD / Public safety / Fear /  uncertainty and doubt / Security / Computer network security / Computer security

FUD: a plea for intolerance Dinei Florêncio, Cormac Herley and Adam Shostack Microsoft Corp., Redmond, WA Even a casual observer of computer security must notice the prevalence of FUD: non-falsifiable claims that promot

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-05-22 14:45:21
932Combinatorics / DIMACS / Secure multi-party computation / International Multilateral Partnership Against Cyber Threats / Computer security / Security / Secure communication / Mathematics

Efficient and Scalable Cybersecurity Using Algorithms Protected by Electricity (ESCAPE) CALL FOR PARTICIPATION DIMACS and IEEE Workshop The best cyber technologies provide strong guarantees on security and privacy proper

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2015-02-24 10:51:43
933Computer-mediated communication / Internet protocols / Cross-platform software / Secure Shell / File Transfer Protocol / Message transfer agent / Gmail / Port / Computing / Internet / Email

Department of Computer Science New User Information On behalf of the Systems Staff at UVA CS, welcome to our department! We look forward to working with you over the course of your stay with the University. Contacting u

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English
934Internet privacy / Espionage / Identity management / Human rights / Digital security / Privacy / Secure communication / Computer security / Computer network security / Ethics / Security

  For Immediate Release January 9, 2015 Access defends and extends the digital rights of users at risk around

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-01-09 15:11:51
935Internet standards / Communication / Office equipment / T.38 / Dialogic Corporation / Modem / Computer network / Internet fax / Technology / Fax / Computing

Small Logo White Paper Safe and Secure Faxing with Dialogic Brooktrout

Add to Reading List

Source URL: www.extracomm.com

Language: English - Date: 2014-07-16 23:23:59
936Secure communication / Computer networking / Network performance / Internet privacy / Cryptographic protocols / Proxy server / Man-in-the-middle attack / HTTP Secure / Keystore / Computing / Internet / Cryptography

CS255: Introduction to Cryptography Winter 2008 Programming Project #2 Due: Wednesday, March 12th, 2008, 11:59 pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-02-26 18:34:22
937Secure communication / Computer networking / Network performance / Internet privacy / Cryptographic protocols / Proxy server / Man-in-the-middle attack / HTTP Secure / Keystore / Computing / Internet / Cryptography

CS255: Introduction to Cryptography Winter 2007 Programming Project #2 Due: Wednesday, March 14th, 2007, 11:59 pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-03-06 20:20:09
938Cyberwarfare / Crime prevention / National security / Secure communication / Threat / Computer network security / Security / Computer security

PRODUCT OVERVIEW Entry-Master ® System V

Add to Reading List

Source URL: www.entry-master.com

Language: English - Date: 2014-11-28 12:56:40
939National security / Technology / Computer network security / Computer security / Electronic commerce / Secure communication / IBM / Database / Computing / Security / Crime prevention

CAMPBELL COUNTY, WYOMING CASE STUDY Journal Audit Reporting Solution Brings IT Staff Unexpected Benefits Fast Facts

Add to Reading List

Source URL: www.kantionit.com

Language: English - Date: 2014-05-14 02:23:17
940Unix shells / Cross-platform software / Unix / Bash / Technical communication / Env / Secure Shell / Command-line interface / Almquist shell / Software / Computing / Scripting languages

Litéra Corporation Response Regarding BASH Vulnerability Litéra Secure File Transfer September 25th, 2014 What is the BASH Vulnerability?

Add to Reading List

Source URL: www.litera.com

Language: English - Date: 2014-09-29 09:06:48
UPDATE