The Lee

Results: 8572



#Item
1World Wide Web / Computing / Digital media / Terms of service / Social media / Electronic Privacy Information Center / Politics and technology / Online advertising / Human rights / Federal Trade Commission / Marc Rotenberg / Privacy policy

October 3, 2018 The Honorable Michael S. Lee Chairman U.S. Senate Committee on the Judiciary Subcommittee on Antitrust, Competition Policy and Consumer Rights

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2018-10-03 09:41:40
2Live / Orbit / Bruce Lee / Martial arts / Chinese people / Entertainment

II. The troubled orbit around Bruce Lee begins with the notion that I do what he did

Add to Reading List

Source URL: origamipoems.com

Language: English - Date: 2018-09-23 08:27:18
3

The Jury Is In: Monolithic OS Design Is Flawed Microkernel-based Designs Improve Security Simon Biggs, Damon Lee,

Add to Reading List

Source URL: ts.data61.csiro.au

Language: English - Date: 2018-08-30 11:33:29
    4Economy / Money / Finance / Collaborative finance / Crowdfunding / Entrepreneurship / Financial technology / Kickstarter

    The Language of Deceivers: Linguistic Features of Crowdfunding Scams ∗ Wafa Shafqat, Seunghun Lee, Sehrish Malik, Hyun-chul Kim Sangmyung University, Cheonan, South Korea

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 01:05:16
    5Culture / Technology / Internet culture / Human behavior / Demographics / Intelligent Community Forum / Pew Research Center / Digital addict / Social media / News media / Opinion poll / Generation Z

    FOR RELEASE APRIL 17, 2018 BY Janna Anderson and Lee Rainie FOR MEDIA OR OTHER INQUIRIES: Janna Anderson, Director, Imagining the Internet Center

    Add to Reading List

    Source URL: assets.pewresearch.org

    Language: English - Date: 2018-06-14 15:45:53
    6Computing / Android / Computer architecture / System software / Smartphones / Social engineering / IOS / Mach / Google Play / Clickjacking / Yo / Mobile security

    Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio Chenxiong Qian, Simon P. Chung, Wenke Lee

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:33
    7Cryptography / Computing / Transport Layer Security / Internet protocols / Cryptographic protocols / Internet Standards / Public-key cryptography / OCSP stapling / Public key certificate / Public key infrastructure / Online Certificate Status Protocol / Hypertext Transfer Protocol

    Towards Sustainable Evolution for the TLS Public-Key Infrastructure Taeho Lee Christos Pappas

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    8Computing / Network architecture / Information and communications technology / Internet architecture / Routing / Computer networking / Internet Standards / Internet protocols / Forwarding plane / Router / Packet loss / Hop

    The Case for In-Network Replay Suppression Taeho Lee∗ Christos Pappas∗ Adrian Perrig

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    9Culture / Technology / Human behavior / Demographics / Generation Z / Social media / Digital divide / Opinion poll / Internet access / Pew Research Center

    FOR RELEASE JULY 3, 2018 BY Janna Anderson and Lee Rainie FOR MEDIA OR OTHER INQUIRIES: Janna Anderson, Director, Imagining the Internet Center

    Add to Reading List

    Source URL: www.pewinternet.org

    Language: English - Date: 2018-09-13 15:12:47
    10

    As I See It...By Jim Lee Change: the Ever Present Constant in Life C By Jim Lee

    Add to Reading List

    Source URL: www.jameslee.com

    Language: English - Date: 2017-09-04 14:45:54
      UPDATE