Semantic security

Results: 252



#Item
211Politics / Government / European Union / Semantic Interoperability Centre Europe / E-Government / Egovernment factsheets / E-participation / OpenForum Europe / European Network and Information Security Agency / Public administration / Technology / Open government

http://epractice.eu/ European ePractice Newsletter N. 280 – 26 May[removed]Latest Cases

Add to Reading List

Source URL: www.epractice.eu

Language: English - Date: 2009-05-27 03:30:15
212XACML / Role-based access control / Authorization / Mandatory access control / Discretionary access control / PERMIS / Computer security / Security / Access control

Enterprise Policy Management with Semantic Technologies Evren Sirin, CTO Clark & Parsia, LLC [removed]

Add to Reading List

Source URL: static59.mediabistro.com

Language: English - Date: 2011-11-18 15:23:10
213Crime prevention / National security / Web services / Semantic Web / World Wide Web / Internet privacy / P3P / Information security / XACML / Security / Computing / Computer security

TO APPEAR: Web and Information Security, E. Ferrari and B. Thuraisingham (eds), Idea Group Inc., Hershey, PA (forthcoming). Creating a Policy-Aware Web: Discretionary, Rule-based Access for the World Wide Web Daniel J. W

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2004-10-18 13:51:24
214Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

Add to Reading List

Source URL: bbcr.uwaterloo.ca

Language: English - Date: 2011-07-16 17:53:26
215Design / Visual arts / Communication / Advertising / Communication design / Graphic design

Seventh International Conference on Semantic Technologies for Intelligence, Defense, and Security – STIDS 2013   Fairfax,  Nov  12-­‐15,  2013

Add to Reading List

Source URL: stids.c4i.gmu.edu

Language: English - Date: 2013-08-27 09:49:10
216Homomorphic encryption / Paillier cryptosystem / Malleability / ElGamal encryption / Probabilistic encryption / Goldwasser–Micali cryptosystem / Ciphertext indistinguishability / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
217Computer crimes / Federated identity / Apple Inc. / Computer security / Security / Semantic URL attack / Phishing / Password / Email address / Spamming

To Update Information on the Everbridge System 1. Type CTAlert.gov into your browser line 2. Click Update Your Profile – on left side of page 3. Type in your Username and Password

Add to Reading List

Source URL: ridgefieldct.org

Language: English - Date: 2012-10-28 14:53:23
218Computer crimes / Federated identity / Apple Inc. / Computer security / Security / Semantic URL attack / Phishing / Password / Email address / Spamming

To Update Information on the Everbridge System 1. Type CTAlert.gov into your browser line 2. Click Update Your Profile – on left side of page 3. Type in your Username and Password

Add to Reading List

Source URL: www.ridgefieldct.org

Language: English - Date: 2012-10-28 14:53:23
219Data security / Gaithersburg /  Maryland / National Institute of Standards and Technology / Information security / Federal Information Security Management Act / Computer programming / TRE / Regular expression / Semantic matching / Computer security / Computing / Security

NIST Special Publication[removed]PRE-PUBLICATION Approximate Matching: Definition and Terminology Frank Breitinger

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-16 12:12:10
220Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Semantic security / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik, School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {ccastell,stasio,gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 19:57:06
UPDATE