Digital security

Results: 4317



#Item
991Id Quantique / Central Digital Television

USER CASE REDEFINING SECURITY Notenstein Private Bank Ltd. High-Speed Network for Disaster Recovery 10G Ethernet Backbone Encryption

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
992Hidden Field Equations / Unbalanced Oil and Vinegar / Full Domain Hash / RSA / Digital signature / One-way function / Cryptography / Public-key cryptography / Post-quantum cryptography

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
993Security appliance / Internet / Technology / Proxy server / Network traffic measurement / Server appliance / Computing / Digital media

Education Visibility. Security. Control. The CP Security Appliance FEATURES: VISIBILITY • Complete Traffic Visibility™

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 14:28:34
994Hacking / Military technology / Computer crimes / Computer security / War / International Multilateral Partnership Against Cyber Threats / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Electronic warfare

Cyber Capability in the Middle East: Seizing Opportunity while Managing Risk in the Digital Age

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-27 04:14:10
995Terminology / Video / Pan tilt zoom camera / Security engineering / NTSC / Red Digital Cinema Camera Company / LANC / PAL / Television / Television technology / Video formats

Video | MIC Series 550 Camera MIC Series 550 Camera www.boschsecurity.com The MIC Series 550 camera combines cutting-edge

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2013-09-16 12:33:39
996National security / Security / Robert Bosch GmbH / Closed-circuit television / ONVIF / Secure Digital / IP camera / Surveillance / Technology / Video

Video | FLEXIDOME micro 2000 IP FLEXIDOME micro 2000 IP www.boschsecurity.com The Bosch 720p and VGA indoor microdome cameras

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2013-12-04 05:17:54
997Federated identity / Digital identity / Digital technology / Identity / Authentication / World Wide Web / Security / Identity management / Computer security

Identity in the Browser - Avoiding Common Flaws Position paper for W3C Workshop on Identity in the Browser, 2011 Brad Hill (independent) Position The author is an independent expert on the subject of s

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2011-05-12 17:26:02
998Password / Security / SMS / In case of emergency / Mobile technology / Technology / Two-factor authentication

CASE STUDY: Technology Widex Widex is one of the world’s leading companies within digital hearing aid technology. Their hearing aids are sold in more than 100 markets around the world. With an increasing need for remo

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-03-18 05:44:10
999Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56
1000Obfuscation / Cryptographic software / Law / Copy protection / Digital rights management / Obfuscated code / Encryption / Software cracking / Source code / Warez / Computing / Computer programming

Security That Works Printer friendly version .NET Intellectual Property Protection The Merits of “True Encryption”

Add to Reading List

Source URL: www.crypkey.com

Language: English - Date: 2014-11-24 15:33:32
UPDATE