F-Secure

Results: 745



#Item
611Trusted computing / Key management / Cryptographic protocols / Trusted Platform Module / Trusted Computing Group / Certificate authority / HTTP Secure / Public key certificate / Counter / Cryptography / Computer security / Public-key cryptography

Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks ∗ Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory (CS

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2007-08-28 16:29:40
612Computing / Mobile technology / Economy of Finland / Smartphones / F-Secure / Technology

Quocirca uniFLOW Mobile Printing recommended by Quocirca The analyst company Quocirca judged NT-ware s uniFLOW to be be the strongest product on the mobile print market, offering an integrated and fully managed mobile p

Add to Reading List

Source URL: nt-ware.com

Language: English - Date: 2014-10-08 04:47:42
613Canadian Council of Professional Engineers / Engineer / Nova Scotia / Software engineering professionalism / Civil engineering / Engineering / Regulation and licensure in engineering / Science

THE ASSOCIATION OF PROFESSIONAL ENGINEERS OF NOVA SCOTIA 1355 Barrington Street, Halifax, Nova Scotia B3J 2M4 T[removed]F[removed]Toll Free[removed]www. engineersnovascotia.ca Professional Practice Ex

Add to Reading List

Source URL: secure.engineersnovascotia.ca

Language: English - Date: 2014-08-28 07:15:13
614United States Department of State / History of the United Kingdom / Colonialism / Political geography / James Kinley / Order of Nova Scotia / Acadia / British North America / Nova Scotia

F.H. SEXTON GOLD MEDAL AWARD TERMS OF REFERENCE

Add to Reading List

Source URL: secure.engineersnovascotia.ca

Language: English - Date: 2014-04-29 13:01:28
615Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
616Contract / Contract law / Law / Pro rata

Protection of Federal Investment Clause To secure the Federal investment, each agreement or contract must include the following (or similar) clause: "This agreement [or contract] starts when fully signed and continues f

Add to Reading List

Source URL: www.fws.gov

Language: English - Date: 2011-07-25 14:26:33
617Health / Article One of the United States Constitution / Presidency of Barack Obama / Healthcare reform in the United States / Government / Politics / Health care reform in the United States / Patient Protection and Affordable Care Act / Healthcare in the United States / 111th United States Congress / Health Care Compact

Health Care Compact; HB 2553 HB 2553 allows Kansas to join the Interstate Health Care Compact. The Compact would allow Compact Member States to regulate health care within their boundaries and to secure federal funding f

Add to Reading List

Source URL: www.kslegislature.org

Language: English
618Electronic commerce / Cryptographic protocols / Secure communication / Extended Validation Certificate / Public key certificate / Certificate authority / Phishing / X.509 / Internet Explorer 7 / Cryptography / Key management / Public-key cryptography

Te c h n o l o g y B r i e f Raising the Bar: Extended Validation SSL Certificates The Next Generation of SSL Certificates

Add to Reading List

Source URL: www.blacksun.ca

Language: English - Date: 2009-01-06 12:21:08
619Electronic commerce / Cryptographic protocols / Secure communication / Extended Validation Certificate / Public key certificate / Certificate authority / Phishing / X.509 / Internet Explorer 7 / Cryptography / Key management / Public-key cryptography

Te c h n o l o g y B r i e f Raising the Bar: Extended Validation SSL Certificates The Next Generation of SSL Certificates

Add to Reading List

Source URL: blacksun.ca

Language: English - Date: 2009-01-06 12:21:08
620Natural resources / Energy policy of the European Union / Energy policy / Energy security / International Association of Oil & Gas Producers / Energy industry / Low-carbon economy / Russia in the European energy sector / Renewable energy commercialization / Energy economics / Energy / European Union

International Association of Oil & Gas Producers May 2012 The EU Energy Policy: Engaging with Partners beyond Our Borders OGP welcomes this Communication and agrees that secure, sustainable and competitive energy is of f

Add to Reading List

Source URL: www.ogp.org.uk

Language: English - Date: 2012-07-18 06:27:47
UPDATE