Secure

Results: 29781



#Item
301

Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt Florian Alt, Heinrich Hussmann LM

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2017-03-09 09:08:27
    302

    FEATURE SPOTLIGHT Securing Virtual Desktop Infrastructure (VDI) The SentinelOne agent is an efficient solution to secure virtual infrastructure including virtual machines, thin clients, layered apps, and VDI implementat

    Add to Reading List

    Source URL: go.sentinelone.com

    Language: English - Date: 2018-08-18 09:30:47
      303

      NUCLEAR ENERGY LIABILITY EXCLUSION ENDORSEMENT Broad Form

      Add to Reading List

      Source URL: secure.fedsprotection.com

      Language: English - Date: 2017-05-22 13:21:54
        304

        Safe Loading A Foundation for Secure Execution of Untrusted Programs Mathias Payer, Tobias Hartmann, Thomas R. Gross Department of Computer Science

        Add to Reading List

        Source URL: nebelwelt.net

        Language: English - Date: 2018-08-13 04:44:10
          305

          Montgomery Ford Lincoln of Troy, NC, Welcomes Bill Glover to their Sales Team! Bill has over 25 years of Automotive Sales experience. Bill would like to invite his neighbors and friends in Asheboro, Denton and the surrou

          Add to Reading List

          Source URL: localfusion.secure.ownlocal.com

          - Date: 2018-06-10 02:10:20
            306

            Internet Access and Computing at the INT Checking email without a local account If all you need is a telnet or secure shell terminal to an outside computer, you can use any available PC without having a local account. Lo

            Add to Reading List

            Source URL: www.int.washington.edu

            Language: English - Date: 2008-02-07 16:48:16
              307

              Service Coordination Manager Designed for Developmental Disabilities Services The Elyxyr Group’s Service Coordination Manager is a secure, centralized, collaborative (amongst participating agencies) website that automa

              Add to Reading List

              Source URL: www.elyxyr.com

              Language: English - Date: 2014-01-09 12:37:50
                308Cryptocurrencies / Economy / Computing / Concurrent computing / Blockchain / Proof-of-stake / Shard / Unspent transaction output / Ethereum / Bitcoin / Cardano / Proof-of-authority

                OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding Eleftherios Kokoris-Kogias† , Philipp Jovanovic† , Linus Gasser† , Nicolas Gailly† , Ewa Syta∗ , Bryan Ford† † Ecole ´ Polytechnique F´ed

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2018-02-21 15:49:54
                309

                Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

                Add to Reading List

                Source URL: cs.nyu.edu

                Language: English - Date: 2006-10-10 04:45:29
                  310

                  Branch Redefined: Enabling the Distributed Enterprise with SD-WAN Citrix customers deliver seamless, secure connectivity with a great experience while

                  Add to Reading List

                  Source URL: www.citrix.com

                  Language: English - Date: 2018-08-03 11:55:52
                    UPDATE