and Security Technologies

Results: 1110



#Item
511Information technology / Technology / English phonology / English orthography / Communication / Educational technology / Information and communication technologies in education

Microsoft PowerPoint - Tanaka Seoul IT security Final-live.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:32
512Markup languages / Computer file formats / Technical communication / XML Signature / XSLT / Canonicalization / WS-Security / SOAP / XPath / Computing / Cryptography standards / XML

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products XML Signature/Encryption — the Basis of Web Services Security

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:28:57
513System administration / System software / Computer security / LogLogic / Network management / Tibco Software / Security information and event management / Telecommunications data retention / Multi Router Traffic Grapher / Information technology management / Data security / Computing

TIBCO LogLogic—The Essential Logging as a Service Solution STATE OF AFFAIRS Every successful enterprise requires a myriad of information technologies. Whether these are applications, networks, or security devices, they

Add to Reading List

Source URL: www.tibco.com

Language: English - Date: 2015-01-19 09:03:42
514Digital signature / Digital credential / Cryptography / Public-key cryptography / Group signature

Special Issue on Security for Network Society Fundamental Security Technologies Anonymous Authentication: For Privacy and Security By Kazue SAKO,* Shoko YONEZAWA* and Isamu TERANISHI*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:15
515Queueing theory / Business / Probability and statistics / Communicating sequential processes / Statistics / Network performance / Operations research

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products A Behavior-Based Process Confinement Method and Its Application to a Server Security Solution “StarDefenc

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:04
516Data security / Anomaly detection / Robust statistics / Intrusion detection system / Outlier / Computer virus / Anomaly-based intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Data analysis

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:06
517Software / Server / Information security / Internet Relay Chat / Windows / Access control / Windows Server / Data loss prevention software / Computing / Computer security / Security

Falsification Prevention and Protection Technologies and Products InfoCage — Information Leakage Protection Software By Masaru KAWAKITA,* Kazuo YANOO,† Masahiro HOSOKAWA,* Hiroshi TERASAKI,* Satoshi AOKI* and Toshim

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:28:59
518Disk encryption / Trusted Platform Module / Trusted Execution Technology / Windows Vista / Direct Anonymous Attestation / BitLocker Drive Encryption / Computer security / Trusted computing / Cryptography

Falsification Prevention and Protection Technologies and Products NEC’s Attitude to “Trusted Computing” By Takahisa SHIRAKAWA* NEC attaches great importance to security for its business PCs (The brand names of NE

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:13
519Quantum information science / Cryptography / Quantum key distribution / Quantum optics / Photon / Optical fiber / Electron / Avalanche photodiode / Introduction to quantum mechanics / Physics / Quantum electrodynamics / Quantum cryptography

Fundamental Security Technologies Recent Progress in Quantum Key Transmission By Akihisa TOMITA*, Yoshihiro NAMBU* and Akio TAJIMA† Recent developments in Quantum Key Distribution (QKD) system are reviewed. A high se

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:17
520Computer security / Security / Security Assertion Markup Language / OpenID / Shibboleth / Federated identity management / Authentication / Privacy-enhancing technologies / PERMIS / Identity management / Federated identity / Identity

IDENTITY MANAGEMENT SYSTEMS Federated Identity Management Systems: A Privacy-Based Characterization Eleanor Birrell and Fred B. Schneider | Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-10-17 13:49:06
UPDATE