Bot Sentry is a Pidgin (libpurple) plugin to prevent Instant Message (IM) spam. It allows you to ignore IMs unless the sender is in your Buddy List, the sender is in your Allow List, or the sender correctly answers a question you have predefined.
copSSH is an ssh server and client implementation for windows systems. It is a yet another packaging of portable openssh, cygwin, some popular utilites, plus implementation of some best practices regarding security. You can use COPSSH for remote administration of your systems or gathering remote information in a secure way.
Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
IBM stellt den Secure Enterprise Desktop - den sicheren Schreibtisch für Unternehmen - vor. Zugelassene Nutzer können auf eine Festplatte sicher zugreifen, alle Daten, aber auch das Betriebssystem und Anwendungen stehen überall in nur zwei Minuten zur Verfügung.
The CEQUENS SMS API is a powerful tool that allows businesses to send and receive SMS messages easily. With the CEQUENS SMS API, businesses can integrate SMS messaging into their existing software platforms, automate their SMS marketing campaigns, and more.
USSHC is a privately owned underground colocation data center located in the rural Midwestern United States. We take pride in offering the most secure, carrier-class, highly secure, colocation data center services available.
O. Goldreich, S. Micali, and A. Wigderson. Proceedings of the nineteenth annual ACM symposium on Theory of computing, page 218--229. New York, NY, USA, ACM, (1987)
M. Shah, and S. Pathak. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XI):
01-04(November 2017)1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET..
D. Dhillon, T. Randhawa, M. Wang, and L. Lamont. Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, 2, page 682 - 688 Vol.2. (March 2004)
R. Giaffreda, D. Cagánová, Y. Li, R. Riggio, and A. Voisard (Eds.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer, Cham, (2015)
M. Jakobsson, and A. Juels. ASIACRYPT '00: Proceedings of the 6th International Conference on
the Theory and Application of Cryptology and Information Security, volume 1976 of Lecture Notes in Computer Science, page 162--177. Springer, (London, UK 2000)
A. Festag, J. Girao, T. Melia, and D. Westhoff. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Dusseldorf, Germany, DFN 2004, (June 2004)DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf.