and Security Technologies

Results: 1110



#Item
491Network architecture / Computer network security / Artificial intelligence / Windows Server / Peer-to-peer / Autonomic computing / Computer network / Server / Virtual private network / Computing / Computer architecture / Distributed computing architecture

Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society Integrated Service Navigation Framework for Ubiquitous Networking By Toshio TONOUCHI,* Norihito FUJITA,† Naoto MAEDA,* Tomohiro IGAKU

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:35:01
492National security / Cyberwarfare / Computer network security / Data security / Information security / Identity management / Network security / Vulnerability / Privacy / Security / Computer security / Crime prevention

Special Issue Advanced Technologies Driving “Dynamic Collaboration” — Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU,† Masato KAWATSU‡ and Mas

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:33:35
493Crime prevention / Computer security / Access control / Physical security / Information security / Radio-frequency identification / Authentication / Identity management / Wireless security / Security / Public safety / National security

Key Technologies Coordinated Implementation of Facilities and Information Security Systems HAYANO Shin-ichiro, TANIKAWA Tadashi, KITAKAZE Jiro

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:33:47
494Software as a service / Platform as a service / Novell Cloud Security Service / OpSource / Cloud computing / Centralized computing / Computing

Cloud-oriented Service Platform Solutions/SaaS platform services & supporting technologies SaaS Platform Services KAWAI Toshiya, TAKANASHI Hiroshi Abstract With recognition of the cloud computing, SaaS and PaaS have bee

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2012-09-11 09:42:55
495Privacy / Trust / Ethics / Identity management / Law

Towards a multi-dimensional technology assessment: The introduction of security technologies at airports and public transport systems Leon Hempel, Tobias Schaaf, Dagny Vedder, and Lars Ostermeier

Add to Reading List

Source URL: prescient-project.eu

Language: English - Date: 2012-12-03 10:51:46
496Digital rights management / Software / Rights Management Services / Information security / OMA DRM / Windows Media DRM / Computing / Security / Copyright law

Key Technologies Business Content Security: Present Issues and Future Outlook for Its Employment SHIMAZU Hideo

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:33:41
497Trusted computing / Next-Generation Secure Computing Base / PlayReady / Copy Control / Trusted Platform Module / InterTrust Technologies / Copy protection / OMA DRM / Protected Media Path / Computer security / Digital rights management / Copyright law

Technological Copyright Enforcement and Open Access Volker Grassmuck for Open Archives Forum Workshop[removed]HU Berlin

Add to Reading List

Source URL: www.oaforum.org

Language: English - Date: 2003-10-17 10:49:35
498Food industry / Technology / Digital divide / Agricultural marketing / Food security / International Telecommunication Union / Market information systems / Information and communication technologies for development / Agriculture / Food and drink / Marketing

onigh CHALLENGE: USING INFORMATION AND COMMUNICATION TECHNOLOGIES TO DEVELOP AGRICULTURAL MARKETS

Add to Reading List

Source URL: www.globalknowledgeinitiative.org

Language: English - Date: 2012-12-27 17:29:25
499Random oracle / Oracle machine / Hash function / One-way compression function / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 Center for Information Security Technologies(CIST), Korea Universit

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:27:34
500Criminology / Crime prevention / Public safety / Crime mapping / Police / Crime statistics / Law enforcement / National security / Law

Predictive Policing: What It Is, What It Isn’t, and Where It Can Be Useful John S. Hollywood, Susan C. Smith, Carter Price, Brian McInnis, Walt Perry NLECTC Information and Geospatial Technologies Center of Excellence

Add to Reading List

Source URL: www.theiacp.org

Language: English - Date: 2013-12-11 10:06:09
UPDATE