Digital security

Results: 4317



#Item
971Social psychology / Security / Conceptions of self / Identity / Positive mental attitude / Digital identity / Psychology of self / Self-esteem / Internet privacy / Ethics / Identity management / Privacy

IRIE International Review of Information Ethics VolAnna-Maria Piskopani:

Add to Reading List

Source URL: www.i-r-i-e.net

Language: English - Date: 2013-08-01 10:09:07
972Computing / Software / Windows Mobile / Personal digital assistant / Encryption / Pocket PC / Encrypting File System / Wireless security / Disk encryption / Cryptography / Cryptographic software

Version 1.2 TM Windows Mobile 5.0 PDA, Windows CE, Pocket PC 2005, 2003

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:19:06
973Internet in Australia / National Broadband Network / Internet / ACN Inc. / Wi-Fi / NBN Co / Digital subscriber line / Wireless security / Wireless network / Telecommunications in Australia / Wireless networking / Technology

Quick-Start Guide NBN Fixed Wireless Plus D-Link Router Australia Quick-Start Guide

Add to Reading List

Source URL: www.acnpacific.com.au

Language: English
974Electronic commerce / Cyberwarfare / Mathematics / Applied mathematics / Implicit certificate / Finite fields / Elliptic Curve DSA / Elliptic curve cryptography / Digital signature / Public-key cryptography / Cryptography / Key management

Security of ECQV-Certified ECDSA Against Passive Adversaries

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-09 14:11:31
975International trade / Monopoly / World Intellectual Property Organization Copyright Treaty / WIPO Performances and Phonograms Treaty / Digital Millennium Copyright Act / Copyright / Security through obscurity / Anti-circumvention / Copyright Directive / Law / 105th United States Congress / Business law

Legal Risks of Vulnerability Disclosure Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
976University of Maryland /  College Park / World Digital Library / Government / Information Security Oversight Office / Declassification / Plain language / Archive / Prologue / The National Archives / National Archives and Records Administration / Information / English languages

National Archives Plain Language 2014 report

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2015-04-14 13:20:48
977Internet protocols / Internet standards / Computer network security / Secure Shell / Port / Transmission Control Protocol / Firewall / Ssh-keygen / FTPS / Computing / Network architecture / Internet

DATA SHEET FASP™ Security Model Bulletproof security for business-critical digital assets All Aspera products have complete, builtin

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-06-23 20:03:39
978Grants / Research / Association of American Universities / Carnegie Mellon University / Knowledge / Privacy / Electronic submission / Institute of Electrical and Electronics Engineers / Carnegie Mellon Silicon Valley / Ethics / Competitions / Digital media

Call for Papers Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. Th

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-08-14 14:31:01
979Mobile technology / New media / Videotelephony / Mobile telecommunications / National security / Mobile phone / Information security / Internet / International Cybercrime / Technology / Crime prevention / Digital media

chapter 3 Section 3 Establishment of a Safe and Secure Ubiquitous Network Society

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2009-10-02 11:39:40
980Key management / Notary / Public-key cryptography / Cyberwarfare / Security / Cryptography / Civil law / Digital signature

A Key Substitution Attack on SFLASHv3 Willi Geiselmann and Rainer Steinwandt IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth Fakult¨ at f¨ ur Informatik, Universit¨at Karlsruhe,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-26 09:47:08
UPDATE