and Security Technologies

Results: 1110



#Item
121

OT appoints Muzaffar Khokhar as Regional President for Russia, Middle-East and Africa Colombes, France, May 30, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and servic

Add to Reading List

Source URL: www.oberthur.com

Language: English - Date: 2016-05-30 05:12:19
    122

    National Security and Societal Implications of Remotely Piloted Aircraft Systems and Related Technologies Philip Hall Principal Fellow, Department of Electrical & Electronic Engineering

    Add to Reading List

    Source URL: ieeessit.org

    Language: English - Date: 2015-06-25 14:34:02
      123

              Planting the future: opportunities and challenges for using crop genetic improvement technologies for sustainable agriculture Agriculture faces major challenges to deliver food security at a time o

      Add to Reading List

      Source URL: www.pannonbiotech.hu

      Language: English - Date: 2014-02-19 08:50:13
        124Competition / Competitiveness / Foreign direct investment / International trade / Innovation / Structure / Information and communication technologies for development / Science / Draft:ICT Security Policy System: A Case Study

        36 committed to Europe 37

        Add to Reading List

        Source URL: www.orange.com

        Language: English
        125

        Authentication Critical RFID PrivacyEnhancing Technologies Using RFID technology, people can automatically and remotely identify objects. With the prospects of this technology, however, come many security concerns. The

        Add to Reading List

        Source URL: ec-wu.at

        Language: English - Date: 2014-07-13 07:57:56
          126

          Improved indifferentiability security analysis of chopMD Hash Function Donghoon Chang1? and Mridul Nandi2 1 Center for Information Security Technologies (CIST)

          Add to Reading List

          Source URL: www.isical.ac.in

          Language: English - Date: 2011-12-28 03:46:39
            127

            Security Practices, Architecture and Technologies CONTACT: 36 S. Wall Street

            Add to Reading List

            Source URL: www.viewabill.com

            Language: English - Date: 2016-02-26 08:42:30
              128

              DHS OIG HIGHLIGHTS Covert Testing of the Transportation Security Administration’s Passenger Screening Technologies and

              Add to Reading List

              Source URL: www.oig.dhs.gov

              Language: English - Date: 2015-09-29 11:10:15
                129Cyberwarfare / Computing / Computer security / Software maintenance / Software release / Patch / Computer network security / Vulnerability / Common Vulnerabilities and Exposures / Transdermal patch / Computer worm / Shavlik Technologies

                Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

                Add to Reading List

                Source URL: adam.shostack.org

                Language: English - Date: 2014-06-11 11:42:33
                130

                The Second International Conference on Emerging Security Information, Systems and Technologies A BODY-CENTERED CUBIC METHOD FOR KEY AGREEMENT IN DYNAMIC MOBILE AD HOC NETWORKS Ioannis G. Askoxylakis Foundation for Resea

                Add to Reading List

                Source URL: damien.sauveron.fr

                Language: English - Date: 2013-02-26 15:54:32
                  UPDATE