and Security Technologies

Results: 1110



#Item
91Communications technology / Information and communications technology / Information technology / Hong Kong / Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

The Hong Kong Computer Society Sees Talent Development as Top Priority for 2014 Digital 21 Strategy Mr. Peter Yan, Hong Kong Computer Society Vice President (Policy and Communications) and Honorary Secretary For consulta

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:25
92Food industry / Agriculture / Agricultural economics / Distribution / International development / Agricultural value chain / Agricultural extension / Agricultural education / Cash crop / Food security / Information and communication technologies for development / Development communication

Volume 2 No. 11, NovemberISSNInternational Journal of Information and Communication Technology Research ©2012 ICT Journal. All rights reserved

Add to Reading List

Source URL: esjournals.org

Language: English - Date: 2012-12-10 05:55:43
93Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

PRESIDENCY CONCLUSIONS OF THE HIGH LEVELCONFERENCE ON FUTURE ICT POLICIES, AMSTERDAM 30 SEPTEMBER 2004 It was generally agreed that a revision of the ICT agenda is required in order to achieve the Lisbon goals. The contr

Add to Reading List

Source URL: www.danielerasmus.com

Language: English - Date: 2008-09-24 18:46:35
94Hong Kong / Pearl River Delta / South China Sea / InvestHK / Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

Hong Kong Information Technology Federation Unit 983, 9/F, Kowloonbay International Trade & Exhibition Centre, 1 Trademart Drive, Kowloon Bay, HK Tel: (Fax: (Email: For th

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:25
95Biometric passport / Biometrics / Data security / Information sensitivity / Passports / Radio-frequency identification / Russian passport

The Republic of Mali chooses OT to supply its latest generation electronic passport Colombes, France, July 20, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and

Add to Reading List

Source URL: www.oberthur.com

Language: English - Date: 2016-07-20 04:20:48
96Internet of Things / Ambient intelligence / Computer security / Smart manufacturing / Gateway / Machine to machine / Smart city / Cloud computing / Smart meter / Jasper Technologies / Sigfox

Network of people and things diag

Add to Reading List

Source URL: www.ey.com

Language: English - Date: 2015-07-29 10:16:25
97Design / Innovation / Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

By e-mail and by post BPF response to Public Consultation on 2014 Digital 21 Strategy BPF is pleased to have the opportunity to respond to your public consultation on 2014 Digital 21 Strategy and confirms its support in

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:06
98Network protocols / Internet protocols / Internet Standards / IP multicast / Multicast / Tor / Overlay multicast / Mechanistic target of rapamycin / Traffic analysis / Internet Relay Chat / Reliability / Email

Proceedings on Privacy Enhancing Technologies ; ):22–39 Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-07-26 12:57:18
99Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
100Professional ethics / Social philosophy / Emerging technologies / Ethics of technology / Privacy / Internet privacy / Business ethics / Ethics / Artificial intelligence / Engineering ethics / Outline of ethics / Computer ethics

Usable Security and Privacy in Technology Ethics Courses Patrick Gage Kelley Department of Computer Science University of New Mexico

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:03
UPDATE