Digital security

Results: 4317



#Item
821RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
822Civil law / Digital signature / Notary / Co-signing / Cyberwarfare / Security / Cryptography / Key management / Public-key cryptography

2105 Lyndale Avenue South Minneapolis, MN3993 wedge.coop Owner Number:

Add to Reading List

Source URL: www.wedge.coop

Language: English - Date: 2014-06-06 10:14:23
823Computer security / Constraint programming / Datalog / Cryptography / Role-based access control / Credential / Digital credential / Trust negotiation / Constraint logic programming / Security / Identity management / Access control

RT : A Role-based Trust-management Framework∗ Ninghui Li John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, mitchell}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-11-04 15:32:03
824Internet culture / Digital media / Computer security / Personal computing / Public computer / Internet / Chat room / Online chat / Electronics / Computing

Liverpool Libraries & Info. Services - Code of Conduct for Library ComputersLiverpool City Council makes every effort to minimise risks to users of public computers, it is neither responsible nor accountabl

Add to Reading List

Source URL: liverpool.gov.uk

Language: English - Date: 2013-09-12 05:24:56
825Information technology audit / Cybercrime / Computing / Forensic Toolkit / Network forensics / Forensic science / Mobile device forensics / EnCase / Department of Defense Cyber Crime Center / Computer forensics / Computer security / Digital forensics

Computer Hacking Forensic Investigator v8 (5 days) Course Description EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to comp

Add to Reading List

Source URL: www.lantecctc.com

Language: English - Date: 2013-09-26 11:52:16
826Smart cards / ISO standards / Ubiquitous computing / Medical informatics / Healthcare / Gemalto / Digital security / Credit card / Electronic prescribing / Medicine / Health / Security

Securing healthcare. Smart health identification

Add to Reading List

Source URL: www.gemalto.com

Language: English - Date: 2014-07-30 14:18:45
827Electromagnetism / Computer storage / Data remanence / Data security / Degaussing / Hard disk drive / Digital Linear Tape / Disk formatting / Computer hardware / Computer storage media / Computing

HD-3WXL High Security Hard Drive & Tape Degausser The Most Features in a Compact Degausser • • •

Add to Reading List

Source URL: www.vector.hk

Language: English - Date: 2013-05-26 23:13:11
828Science / Open data / Geographic information system / Food security / Data analysis / Data architecture / Data management / Information technology management / Data

Is s u e 7 9 February 2015 the he digital springboard for inclusive agriculture

Add to Reading List

Source URL: www.godan.info

Language: English - Date: 2015-04-28 04:02:26
829Security / Microchip implant / Animal identification / CASPIAN / VeriChip / Cancer / Animal testing / Digital Angel / Radio-frequency identification / Medicine / Health

Synopsis of "Microchip­Induced Tumors in Laboratory Rodents and Dogs:  A Review of the Literature 1990–2006" By Katherine Albrecht, Ed.D. Overview This document summarizes a paper titled "Microc

Add to Reading List

Source URL: www.chipmenot.org

Language: English - Date: 2010-10-15 16:17:43
830Computing / Cryptography / Intrusion prevention system / System administration / Honeypot / Computer virus / Digital signature / Denial-of-service attack / Computer network security / Cyberwarfare / Computer security

P:/Deliverables/D1.2/d1.2.dvi

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-06-21 09:33:26
UPDATE