Secure

Results: 29781



#Item
1Marketing / Economy / Content delivery networks / Computing / Fastly / Internet security / Services marketing / Brand management / Customer experience / Yelp

Fastly Powering fast, secure, and scalable digital experiences Great digital experiences drive business Every day customers interact with your brand online, and their experiences impact their purchasing decisions, your

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2018-10-10 16:27:05
2Computing / Theoretical computer science / Software engineering / Computer science / Formal methods / Logic in computer science / Functional languages / Formal verification / Xavier Leroy / Computer security / Coq / French Institute for Research in Computer Science and Automation

École Normale Supérieure Mémoire d’habilitation à diriger des recherches Specialité Informatique The Quest for Formally Secure Compartmentalizing Compilation

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2018-10-11 15:04:00
3Circuit complexity / Theoretical computer science / Computational complexity theory / Cryptographic protocols / Electronic engineering / Theory of computation / Secure multi-party computation / Logic families / Digital circuits / Transistortransistor logic / NC / Circuit

Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2014-03-20 23:52:12
4Software / Computing / System software / Instant messaging clients / Internet privacy / Cross-platform software / Cryptographic software / Public key infrastructure / Email encryption / IMessage / Secure communication / Threema

Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:17
5Cryptography / National Institute of Standards and Technology / Block cipher / Advantage / Random number generation / RSA / Pseudorandom number generators / Dual EC DRBG

Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna Secure Systems Pitney Bowes Inc.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-01 07:43:52
6Science and technology in Europe / TNO / Netherlands Organisation for Applied Scientific Research / Economy of Europe / Europe / European Defence Fund / Common Security and Defence Policy / European Union / Webinos / Brexit and arrangements for science and technology

DEFENDING EUROPE The European Defence Fund It is the most basic and universal of rights to feel safe and secure in your own home. Our Union should provide that for Europeans.

Add to Reading List

Source URL: eeas.europa.eu

Language: English
7Cryptography / Cryptographic hash functions / Error detection and correction / Hashing / NIST hash function competition / Secure Hash Algorithms / SHA-3 / SHA-1 / Crypt / SHA-2

Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2017-02-27 12:19:53
8

2015 IEEE Symposium on Security and Privacy Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:13
    9Cardiac electrophysiology / Medical devices / Neuroprosthetics / Medicine / Technology / Computing / Cybernetics / Implantable cardioverter-defibrillator / International Statistical Classification of Diseases and Related Health Problems / Universal Software Radio Peripheral / Artificial cardiac pacemaker / Radio-frequency identification

    Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin† Thomas S. Heydt-Benjamin†

    Add to Reading List

    Source URL: www.secure-medicine.org

    Language: English - Date: 2017-10-06 05:31:23
    10Computing / System software / Network architecture / Computer architecture / Emerging technologies / OpenFlow / Software-defined networking / Transaction processing / Nox / Network function virtualization / LXC / Network switch

    Control-plane Isolation and Recovery for a Secure SDN Architecture Takayuki Sasaki Daniele E. Asoni

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    UPDATE