Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
copSSH is an ssh server and client implementation for windows systems. It is a yet another packaging of portable openssh, cygwin, some popular utilites, plus implementation of some best practices regarding security. You can use COPSSH for remote administration of your systems or gathering remote information in a secure way.
Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
IBM stellt den Secure Enterprise Desktop - den sicheren Schreibtisch für Unternehmen - vor. Zugelassene Nutzer können auf eine Festplatte sicher zugreifen, alle Daten, aber auch das Betriebssystem und Anwendungen stehen überall in nur zwei Minuten zur Verfügung.
USSHC is a privately owned underground colocation data center located in the rural Midwestern United States. We take pride in offering the most secure, carrier-class, highly secure, colocation data center services available.
Bot Sentry is a Pidgin (libpurple) plugin to prevent Instant Message (IM) spam. It allows you to ignore IMs unless the sender is in your Buddy List, the sender is in your Allow List, or the sender correctly answers a question you have predefined.
M. Shah, и S. Pathak. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XI):
01-04(ноября 2017)1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET..
S. Matsumoto, S. Hitz, и A. Perrig. Proceedings of the Third Workshop on Hot Topics in Software Defined
Networking, стр. 103--108. New York, NY, USA, ACM, (2014)
B. Olagbegi, и N. Meghanathan. International journal on applications of graph theory in wireless
ad hoc networks and sensor networks, 2 (2):
1-15(июня 2010)
S. Kraxberger, и U. Payer. Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on, стр. 210 -216. (июня 2009)
A. Ben-David, N. Nisan, и B. Pinkas. Proceedings of the 15th ACM Conference on Computer and Communications
Security, стр. 257--266. New York, NY, USA, ACM, (2008)
S. Jha, L. Kruger, и V. Shmatikov. Proceedings of the 2008 IEEE Symposium on Security and Privacy, стр. 216--230. Washington, DC, USA, IEEE Computer Society, (2008)
S. Izmalkov, S. Micali, и M. Lepinski. Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer
Science, 2005., стр. 585-594. New York, NJ, USA, IEEE Computer Society, (октября 2005)
F. Hong, L. Hong, и C. Fu. Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on, 1, стр. 713--718. IEEE, (2005)
A. Festag, J. Girao, T. Melia, и D. Westhoff. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Dusseldorf, Germany, DFN 2004, (июня 2004)DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf.
D. Dhillon, T. Randhawa, M. Wang, и L. Lamont. Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, 2, стр. 682 - 688 Vol.2. (марта 2004)
D. Malkhi, N. Nisan, B. Pinkas, и Y. Sella. Proceedings of the 13th USENIX Security Symposium, стр. 287--302. Berkeley, CA, USA, USENIX Association, (2004)
M. Atallah, F. Kerschbaum, и W. Du. Proceedings of the 2003 ACM workshop on Privacy in the electronic
society, стр. 39--44. New York, NY, USA, ACM, (2003)
P. Papadimitratos, и Z. Haas. IEEE Workshop on Security and Assurance in Ad hoc Networks and 2003
International Symposium on Applications and the Internet, Orlando,
FL, January 28, 2003, (2003)
K. Kurosawa, и W. Ogata. ESORICS '02: Proceedings of the 7th European Symposium on Research
in Computer Security, том 2502 из Lecture Notes in Computer Science, стр. 24--38. London, UK, Springer, (2002)