Computer surveillance

Results: 1478



#Item
41Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
42Mass surveillance / Espionage / Marketing / Computer surveillance / PRISM / Privacy of telecommunications / Email / Accounts receivable / Outlook.com / Call centre

ARC Customer Conference Scheduled for May 20, 2008

Add to Reading List

Source URL: arc.publicdebt.treas.gov

Language: English - Date: 2016-08-05 12:54:41
43Avionics / Air traffic control / Warning systems / Computer network security / Aircraft collision avoidance systems / Traffic collision avoidance system / Automatic dependent surveillance  broadcast / Secondary surveillance radar / Computer security / Wireless security / Aviation accidents and incidents / Aviation safety

CyCon_2016_book_sisu.indd

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2016-08-02 08:53:24
44Computer access control / Cyberwarfare / Hacking Team / Spyware / Surveillance / Internet Explorer / Adobe Flash Player / POODLE / Common Vulnerabilities and Exposures

ESET_Logo_HorizontalClaim-White

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2016-01-22 06:05:11
45Surveillance / Motion detection / Security / Computer vision / Robotics / Robot / Closed-circuit television / Video tracking / Visual odometry

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-01 07:05:22
46Computer access control / Biometrics / Identification / Surveillance / Data security / Authentication / Strong authentication / Biometric Tokenization / Biometric passport

Trusted BWI: Privacy and Trust Enhanced Biometric Web Identities Abdullah A. Albahdal, Hamdan Alzahrani, Lalit Prithviraj Jain, and Terrance E. Boult University of Colorado at Colorado Springs Colorado Springs, CO 80918

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:56:27
47Biometrics / Security / Computer access control / Identification / Surveillance / Speaker recognition / Password / Authentication / Computer security

Copyright 2013 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a

Add to Reading List

Source URL: www.wjscheirer.com

Language: English - Date: 2013-07-07 22:38:19
48Privacy of telecommunications / Mass surveillance / National security / Computer surveillance / Crime prevention / Lavabit / National Security Agency / Edward Snowden / Tailored Access Operations / PRISM / Qwest / Surveillance

Schneier on Security: More on the NSA Commandeering the Internet

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-09-11 13:58:48
49Materials science / Infrared imaging / Surveillance / Electromagnetic spectrum / Infrared non-destructive testing of materials / Infrared / Corrosion / Nondestructive testing / Thermographic camera / Emissivity / Delamination

22 Groundwater Modeling Advancing computer technology and our continued creativity are key to the

Add to Reading List

Source URL: str.llnl.gov

Language: English - Date: 2014-07-09 11:56:36
50Computer surveillance / Espionage / Mass surveillance / PRISM / Privacy of telecommunications / War on Terror / Federal procurement data system

U.S. Securities and Exchange Commission Automated Electronic Contract Writing System A Bit of History

Add to Reading List

Source URL: www.fai.gov

Language: English - Date: 2015-04-20 14:40:28
UPDATE