Secure communication

Results: 3134



#Item
51Reprinted with permission from the October 2015 issue  Cybercrimes And The Threat To Lender Data How stronger security and response plans can protect lenders from a data breach. By Lee Brodsky

Reprinted with permission from the October 2015 issue Cybercrimes And The Threat To Lender Data How stronger security and response plans can protect lenders from a data breach. By Lee Brodsky

Add to Reading List

Source URL: www.mortgagebankinginsurance.com

Language: English - Date: 2015-11-12 13:58:00
522016 Editorial Calendar Month Featured Topic  Editorial Details

2016 Editorial Calendar Month Featured Topic Editorial Details

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-05-24 14:49:01
53Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project   Nick Mathewson

Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:32:00
54Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum Hoon Wei Lim

Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum Hoon Wei Lim

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-08-28 05:10:21
55Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.ischool.drexel.edu

Language: English - Date: 2014-02-06 12:27:42
56Server-driven Outbound Web-application Sandboxing  FP7-ICT, Project Nohttps://www.websand.eu  Deliverable D1.1

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
57Server-driven Outbound Web-application Sandboxing  FP7-ICT, Project Nohttps://www.websand.eu  Deliverable D2.1

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:49
58PLACES’10  The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
59............................................................... .............................................................. ............................................................... .............................

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-10-23 12:02:35
60Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1  U.S. Naval Research Laboratory

Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1 U.S. Naval Research Laboratory

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-03 06:13:52