Information security

Results: 50180



#Item
941The proceedings version of this paper appears in ACM CCSThis is the full version of that paper.  Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
942Exclusive panel on Identity Management, Privacy and Security Achieves Success at the World Economic Forum Meeting in Davos 2014 Geneva 28th January, 2014 – At the roundtable on Addressing Identity of People and Things,

Exclusive panel on Identity Management, Privacy and Security Achieves Success at the World Economic Forum Meeting in Davos 2014 Geneva 28th January, 2014 – At the roundtable on Addressing Identity of People and Things,

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-01-30 13:49:03
943DEMOGRAPHIC FORM PATIENT INFORMATION ALL INFORMATION MUST BE COMPLETED AND CURRENT PLEASE PRINT Email:

DEMOGRAPHIC FORM PATIENT INFORMATION ALL INFORMATION MUST BE COMPLETED AND CURRENT PLEASE PRINT Email:

Add to Reading List

Source URL: drpgrant.com

Language: English - Date: 2014-07-28 18:10:47
944BENEFICIARY / TRUST CHANGE REQUEST FORM  MEMBER INFORMATION Please check one:  [ ] Active

BENEFICIARY / TRUST CHANGE REQUEST FORM MEMBER INFORMATION Please check one: [ ] Active

Add to Reading List

Source URL: www.icers.info

Language: English - Date: 2012-04-04 15:14:00
945WP29 opinionon e-privacy directive

WP29 opinionon e-privacy directive

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2010-08-12 12:28:12
946Electronic Conveyancing National Law (Victoria)  Operating Requirements Determined by the Registrar of Titles Version 3

Electronic Conveyancing National Law (Victoria) Operating Requirements Determined by the Registrar of Titles Version 3

Add to Reading List

Source URL: www.dtpli.vic.gov.au

Language: English - Date: 2015-09-29 22:03:52
947University Information Technology Services Training, Outreach, Learning Technologies & Video Production Troubleshooting Guide for KSU Wifi on WindowsClick on the Start Menu then go to Settings (see Figure 1).

University Information Technology Services Training, Outreach, Learning Technologies & Video Production Troubleshooting Guide for KSU Wifi on WindowsClick on the Start Menu then go to Settings (see Figure 1).

Add to Reading List

Source URL: apps.kennesaw.edu

Language: English - Date: 2015-09-25 15:19:32
948AUTHORIZATION TO RELEASE FINANCIAL AID INFORMATION/PRIVACY OF STUDENT RECORDS (FERPA

AUTHORIZATION TO RELEASE FINANCIAL AID INFORMATION/PRIVACY OF STUDENT RECORDS (FERPA

Add to Reading List

Source URL: www.okcu.edu

Language: English - Date: 2016-05-24 11:53:47
949The next step in IT security after Snowden Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is)

The next step in IT security after Snowden Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is)

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-10 07:43:45
950SECURITY TIPS FOR MOBILE BANKING  Tips to protect your information when using a mobile device to do your banking: • • •

SECURITY TIPS FOR MOBILE BANKING Tips to protect your information when using a mobile device to do your banking: • • •

Add to Reading List

Source URL: www.bhbt.com

Language: English - Date: 2014-11-10 13:37:48