Digital security

Results: 4317



#Item
21

Digital Audio Forensics: A First Practical Evaluation on Microphone and Environment Classification Christian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang Research Group Multimedia and Security Department of C

Add to Reading List

Source URL: omen.cs.uni-magdeburg.de

Language: English - Date: 2015-08-25 06:53:44
    22

    NemID conditions for online banking and public digital signatures, v.7 1 Introduction NemID is a security solution that you can use for accessing your online

    Add to Reading List

    Source URL: www.nemid.nu

    Language: English - Date: 2018-07-04 14:06:03
      23Theoretical computer science / Quantum information science / Quantum mechanics / Quantum computing / Models of computation / Logic gates / Quantum gates / Quantum logic gate / Quantum circuit / Qubit / Toffoli gate / Controlled NOT gate

      Solving binary MQ with Grover’s algorithm Peter Schwabe and Bas Westerbaan ? Digital Security Group, Radboud University

      Add to Reading List

      Source URL: cryptojedi.org

      Language: English - Date: 2016-09-12 11:55:28
      24

      Executive Summary: Researching digital security training for human rights defenders Introduction As technology becomes increasingly fundamental to the work of many human rights defenders (HRDs), a parallel expansion can

      Add to Reading List

      Source URL: secresearch.tacticaltech.org

      Language: English - Date: 2016-03-31 02:21:59
        25

        Computing Isogenies between Montgomery Curves Using the Action of (0, 0) Joost Renes? Digital Security Group, Radboud University, Nijmegen, The Netherlands

        Add to Reading List

        Source URL: www.cs.ru.nl

        Language: English - Date: 2018-01-24 03:31:37
          26

          Initiative for Europe A sovereign, united, democratic Europe Faced with the great challenges of our times, such as defence and security, great migrations, development, climate change, the digital revolution and regulati

          Add to Reading List

          Source URL: www.elysee.fr

          Language: English - Date: 2017-09-26 13:38:16
            27

            Critical issues in the practical use of digital signatures Frederick Hirsch, Chair W3C XML Security WG Nokia OASIS Open Standards Forum 2008

            Add to Reading List

            Source URL: events.oasis-open.org

            Language: English - Date: 2008-10-07 10:02:06
              28

              INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of life of citizens and transformed the way that

              Add to Reading List

              Source URL: www.cert.gov.lk

              Language: English - Date: 2018-04-17 05:12:00
                29

                2015 IEEE CS Security and Privacy Workshops Protocol state machines and session languages: specification, implementation, and security flaws Erik Poll and Joeri de Ruiter Digital Security group, Radboud University Nij

                Add to Reading List

                Source URL: spw15.langsec.org

                Language: English - Date: 2015-05-21 16:44:10
                  30

                  Evaluating Automated Facial Age Estimation Techniques for Digital Forensics Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon Forensics and Security Research Group School of Computer Science University College Dub

                  Add to Reading List

                  Source URL: forensicsandsecurity.com

                  Language: English - Date: 2018-03-29 07:05:28
                    UPDATE