All pages
All pages | Next page (NAP (Network Access Protection)) |
- 1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
- 64 Studio
- 9P (the Plan 9 File system Protocol)
- ACL (Access Control List)
- ACS (Audit Collection Services)
- AFFS (Acer Fast File System)
- ARM (Advanced RISC Machine)
- ATS (programming language)
- ATS (язык программирования)
- AV Linux
- A Byte-Based Guess and Determine Attack on SOSEMANUK
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack Gregor
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- A Group Signature Scheme from Lattice Assumptions
- Access Token
- Active Directory
- Adaptive Pseudo-Free Groups and Applications
- Adobe ColdFusion
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Aerospike database
- Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem
- Alice ML (programming language)
- Amazon DynamoDB
- Amazon SimpleDB
- Amiga E
- Analyzing Blockwise Lattice Algorithms using Dynamical Systems
- Apache Accumulo
- Apache Ambari
- Apache Ant
- Apache Attic
- Apache Avro
- Apache Axis
- Apache Beehive
- Apache Brooklyn
- Apache Cassandra
- Apache Chemistry
- Apache CloudStack
- Apache Continuum
- Apache CouchDB
- Apache Derby
- Apache Directory
- Apache Excalibur
- Apache Flink
- Apache Forrest
- Apache Geronimo
- Apache Giraph
- Apache HBase
- Apache HTTP Server
- Apache Hadoop
- Apache Harmony
- Apache Hive
- Apache Ivy
- Apache Jackrabbit
- Apache Marmotta
- Apache Mesos
- Apache ODE
- Apache Pig
- Apache Portable Runtime
- Apache Sqoop
- Apache Storm
- Apache Tapestry
- Apache Tomcat
- Apache Trafodion
- Apache Tuscany
- Apache ZooKeeper
- AppArmor
- Aptosid
- ArangoDB
- Arc (programming language)
- AutoIt
- Automatic Search of Attacks on round-reduced AES and Applications
- BCEL (Byte Code Engineering Library)
- BEDO DRAM (Burst Extended Data Output DRAM)
- BEDO RAM (Burst Extended Data Output DRAM)
- BGP (Border Gateway Protocol)
- BGP confederation
- B (programming language)
- BaaS (Backend-as-a-Service)
- Baltix Linux
- BaseX
- Battleship (Computer game)
- BeanShell
- Berkeley DB
- BigPipe
- Blitz BASIC
- Bootstrap (front-end framework)
- Brainfuck
- Btrieve
- Burmester-Desmedt (protocol)
- Bypass switch
- C++ (programming language)
- C-Store
- CARP (Common Address Redundancy Protocol)
- CGroups (Control Groups)
- CHAP (Challenge Handshake Authentication Protocol)
- CHIP-8 (programming language)
- CPL (programming language)
- CRAM (Challenge-Response Authentication Mechanism)
- CSQL
- CUBRID
- C (programming language)
- C Sharp
- Ceylon (programming language)
- Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
- Chroot
- Cilk
- Clam AntiVirus
- Classical Cryptographic Protocols in a Quantum World
- Clojure (programming language)
- Cobra (programming language)
- CoffeeScript
- Collision Attacks against the Knudsen-Preneel Compression Functions
- Computer-Aided Security Proofs for the Working Cryptographer
- ConceptBase
- Concurrent composition in the bounded quantum storage model
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Confidential Signatures and Deterministic Signcryption
- Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments
- Constant-Size Commitments to Polynomials and Their Applications
- CoreOS
- CrunchBang Linux
- Cryptography with Tamperable and Leaky Memory
- Crystal (programming language)
- Curl (programming language)
- Cython
- DASS (Distributed Authentication Security Service)
- DBaaS (Database-as-a-service)
- DDR3 SDRAM
- DDR4 SDRAM
- DDR SDRAM
- DIMM (Dual In-line Memory Module)
- DRAM (Dynamic Random Access Memory)
- DSL (Damn Small Linux)
- D (programming language)
- DataFlex
- Db4o
- Dbm
- Decentralizing Attribute-Based Encryption
- Defining the parameters of the remote workstation
- Delphi (programming language)
- Denning–Sacco (protocol)
- Development of the program of file exchange between local network users
- Distance Hijacking Attacks on Distance Bounding Protocols
- Docker
- Domain Extension for MACs Beyond the Birthday Barrier
- DoudouLinux
- Dreamlinux
- Drizzle (database)
- Drizzle (база данных)
- Druid (Data Store)
- DuAL (Document Access Language)
- EAP-PSK (Pre-Shared Key)
- EAP-TLS (Transport Layer Security)
- EAP-TTLS (Tunneled Transport Layer Security)
- EAP (Extensible Authentication Protocol)
- EDO DRAM (Extended Data Out DRAM)
- EFS (Encrypting File System)
- EKE (Encrypted Key Exchange)
- ES6
- ESDRAM (Enhanced SDRAM)
- EXistdb
- E (programming language)
- Effcient Non-Interactive Secure Computation
- Efficient Arithmetic on Hessian Curves
- Efficient Circuit-Size Independent Public Key Encryption with KDM Security
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Efficient String-Commitment from Weak Bit-Commitment
- Efficient arithmetic on Hessian curves
- Elixir (programming language)
- EnterpriseDB
- Erlang (programming language)
- Etcd
- ExtremeXOS
- FIPS PUB 180-1
- FIPS PUB 180-2
- FIPS PUB 180-3
- FIPS PUB 180-4
- FPM DRAM (Fast Page Mode DRAM)
- FaaS (Function-as-a-Service)
- Fedora
- File system
- Firebird (database)
- Fleet (a distributed init system)
- FlockDB
- Floppy disk
- FreeBSD
- Freespire
- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
- Fully Leakage-Resilient Signatures
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- GCstar
- GDDR2 (Graphics Double Data Rate 2)
- GDDR3 (Graphics Double Data Rate 3)
- GDDR4 (Graphics Double Data Rate 4)
- GID (Group identifier)
- GLSL (OpenGL Shading Language)
- GNOME-DB
- GNU Octave
- GNU Zebra
- GPSS (General Purpose Simulation System)
- GRUB (GRand Unified Bootloader)
- GT.M
- Gadfly (database)
- Generic Compilers for Authenticated Key Exchange
- Generic Side-Channel Distinguishers: Improvements and Limitations
- Gentoo
- Go! (programming language)
- Go (programming language)
- Groth–Sahai proofs revisited
- H-Store
- HDD (Hard Disk Drive)
- HDFS (Hadoop Distributed Filesystem)
- HIDS (Host-Based Intrusion Detection System)
- HLSL (High Level Shader Language)
- HPGL (Hewlett-Packard Graphics Language)
- HSQLDB (Hyper SQL Database)
- Hack (programming language)
- Handel-C
- Harbour (programming language)
- Haskell (programming language)
- Haxe
- Haystack
- Hibari (database)
- Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
- Hope (programming language)
- HyperDex
- Hypertable
- IBE (Identity-Based Encryption)
- IBGP (Internal BGP)
- IBM Notes
- IBM System/360
- IDS (Intrusion Detection System)
- IEC 61131-3
- IIS (Internet Information Services)
- IL (Instruction List)
- INTERCAL
- IPS (Intrusion Prevention Systems)
- IPTABLES
- IPsec (IP Security)
- ISWIM
- Icon (programming language)
- Identity-Based Aggregate and Multi-Signature Schemes Based on RSA
- Implementing Gentry's Fully-Homomorphic Encryption Scheme
- Improved Generic Algorithms for Hard Knapsacks
- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- InfiniDB
- Infobright
- Inform
- Ingres (database)
- Intel Cilk Plus
- InterBase
- Io (programming language)
- JASS (Just Another Scripting Syntax)
- JCL (Job Control Language)
- JPHP
- JPQL (Java Persistence Query Language)
- JSTL (JavaServer Pages Standard Tag Library)
- JScript
- J (programming language)
- Java
- JavaScript
- Joy (programming language)
- Julia (programming language)
- KAP (Key-Agreement Protocol)
- KBasic
- KRC (Kent Recursive Calculator)
- KVM (Kernel-based Virtual Machine)
- K (programming language)
- Katahdin
- Kerberos (protocol)
- Kexi
- Key-Dependent Message Security: Generic Amplification and Completenes
- Key-Evolution Schemes Resilient to Space-Bounded Leakage
- KiXtart
- Kotlin
- Kph (Korn shell)
- Kubernetes
- L2TP (Layer 2 Tunneling Protocol)
- LAN Manager
- LEAP (Lightweight Extensible Authentication Protocol)
- LESS (stylesheet language)
- LOLCODE
- Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More
- Leakage-Resilient Zero Knowledge
- Leakage Resilient ElGamal Encryption
- Leftover Hash Lemma, Revisited
- Liberty BASIC
- Limbo (programming language)
- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
- Linda (coordination language)
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- Linux Mint
- Lisaac
- Lua (programming language)
- LucidDB
- MAXScript
- MBSA (Microsoft Baseline Security Analyzer)
- MC Sharp
- MFRL/PC (Frame Representation Language with Matching for PC)
- MIDL (Microsoft Interface Definition Language)
- MISD (Multiple Instruction stream, Single Data stream)
- ML (Meta Language)
- MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)
- MUMPS (Massachusetts General Hospital Utility Multi-Programming System)
- MVPL (Microsoft Visual Programming Language
- Maatkit
- MacBASIC
- MacOS Sierra
- Mageia
- Main Page
- Malbolge
- Managed C++
- Mandriva Linux
- MapReduce
- MariaDB
- Markdown
- MemSQL
- MemcacheDB
- Memory Delegation
- Memory management (Operating Systems)
- Memory protection (Operating Systems)
- Memory segmentation
- Mercury (programming language)
- Merkle Puzzles in a Quantum World
- MetaPost
- Metakit
- Mhddfs
- Microsoft Hyper-V
- Microsoft SQL Server
- Microsoft SQL Server Desktop Engine
- Mnesia
- MobileBASIC
- Mod rewrite
- Modelica
- MonetDB
- MongoDB
- Monkey X
- More Constructions of Lossy and Correlation-Secure Trapdoor Functions
- Mozilla Raindrop
- Multiprotocol BGP
- Multitasking (Operating Systems)
- MySQL