Secure communication

Results: 3134



#Item
11WHITE PAPER  Secure Communication Technology Panasonic Video Surveillance Systems  Table of contents

WHITE PAPER Secure Communication Technology Panasonic Video Surveillance Systems Table of contents

Add to Reading List

Source URL: ssbu-t.psn-web.net

- Date: 2016-06-08 00:20:37
    12Study on a Secure Wireless Data Communication in Internet of Things Applications

    Study on a Secure Wireless Data Communication in Internet of Things Applications

    Add to Reading List

    Source URL: paper.ijcsns.org

      13Medicaid Waiver Management Application (MWMA) Project Communication: Changes in R5 The Medicaid Waiver Management Application (MWMA) was launched on April 17, 2015. It is a secure web based system that streamlines and im

      Medicaid Waiver Management Application (MWMA) Project Communication: Changes in R5 The Medicaid Waiver Management Application (MWMA) was launched on April 17, 2015. It is a secure web based system that streamlines and im

      Add to Reading List

      Source URL: www.chfs.ky.gov

      - Date: 2016-08-25 08:47:03
        14contributed articles DOI:The Dissent system aims for a quantifiably secure, collective approach to anonymous communication online.

        contributed articles DOI:The Dissent system aims for a quantifiably secure, collective approach to anonymous communication online.

        Add to Reading List

        Source URL: www.cs.yale.edu

        - Date: 2015-10-09 08:04:47
          15Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribusion Systems with Trade-offs between Communication and Storage  Yohei Watanabe and Junji Shikata

          Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribusion Systems with Trade-offs between Communication and Storage Yohei Watanabe and Junji Shikata

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          - Date: 2015-11-22 02:25:28
            16INSIDE: ACH Rules Update for Originating Companies....................................................................................................pg. 1  What’s New in the World of NFC Terminals?....................

            INSIDE: ACH Rules Update for Originating Companies....................................................................................................pg. 1 What’s New in the World of NFC Terminals?....................

            Add to Reading List

            Source URL: www.yourcommunitybank.com

            Language: English - Date: 2014-11-10 16:06:31
            17Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

            Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

            Add to Reading List

            Source URL: rich.recoil.org

            Language: English - Date: 2006-04-19 14:01:38
            18MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY PolicyPrivacy, Security, and Monitoring Approved: May 24, 2002; Revised: May 25, 2012

            MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY PolicyPrivacy, Security, and Monitoring Approved: May 24, 2002; Revised: May 25, 2012

            Add to Reading List

            Source URL: mus.edu

            Language: English - Date: 2012-05-29 12:54:58
            19Press Release Connected Vehicle Cybersecurity Creates Risks and Opportunities in Automotive Market, According to VDC Research Carmakers finally coming to grips with security threats, but still have a long road ahead. The

            Press Release Connected Vehicle Cybersecurity Creates Risks and Opportunities in Automotive Market, According to VDC Research Carmakers finally coming to grips with security threats, but still have a long road ahead. The

            Add to Reading List

            Source URL: www.vdcresearch.com

            Language: English - Date: 2016-03-03 10:07:18
            202015 IEEE Symposium on Security and Privacy  How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

            2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

            Add to Reading List

            Source URL: www.ieee-security.org

            Language: English - Date: 2015-05-11 16:43:10