Secure

Results: 29781



#Item
41Cryptography / Disk encryption / Cryptographic software / Dm-crypt / Symmetric-key algorithm / Comparison of disk encryption software / AES implementations

E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on European Multilaterally Secure Computing Base (EMSCB)

Add to Reading List

Source URL: www.emscb.de

Language: English - Date: 2011-05-11 05:57:21
42Cryptography / Computer security / Direct Anonymous Attestation / Trusted Platform Module / Trusted Computing Group / Trusted Computing / Proof of knowledge / FiatShamir heuristic / Non-interactive zero-knowledge proof / Zero-knowledge proof

One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation Jan Camenisch1 , Liqun Chen2 , Manu Drijvers1,3 , Anja Lehmann1 , David Novick4 , and Rainer Urian5 1 IBM Research – Zurich

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-06-28 09:41:56
43Cryptographic protocols / Electromagnetism / Garbled circuit / Secure multi-party computation / IP / Theory of computation / NC / Electronic circuit / Applied mathematics / Commitment scheme

CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-03-10 13:39:26
44Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-08-01 09:35:04
45Electromagnetism / Transistortransistor logic / Topology / Network topology / Computer network / Electrical engineering / Electronics

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier◦, Petar Tsankov◦, Vincent Lenders, Laurent Vanbever◦, Martin Vechev◦ ◦ ETH Zürich,

Add to Reading List

Source URL: nsg.romeier.ch

Language: English - Date: 2018-06-15 12:22:06
46Identity management / Computer access control / Identity / Identity document / Namespace

Portable Identity OVERVIEW Portable Identity is the right and responsibility of each of us to create, control, and carry the important pieces of information that define who we are in a private, secure, and trusted manner

Add to Reading List

Source URL: www.globalid.net

Language: English - Date: 2018-05-23 15:04:09
47Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-25 08:06:46
48Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 03:19:52
49

Optical Disc Archive Cartridge Keep It Simple, Secure & Long-term Reliable, Durable mass storage Optical media A variety of high capacity media cartridges are available for the Optical Disc Archive System, From 300GB

Add to Reading List

Source URL: www.teradactyl.com

Language: English
    50Software engineering / Computing / Programming language theory / Type theory / Formal methods / Functional languages / Procedural programming languages / Data types / Type system / F Sharp / HindleyMilner type system / First-order logic

    Refinement Types for Secure Implementations JESPER BENGTSON, Uppsala University KARTHIKEYAN BHARGAVAN, Microsoft Research ´ CEDRIC FOURNET, Microsoft Research

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2012-02-28 13:28:34
    UPDATE