Computer security conference

Results: 514



#Item
371Identity management / Conference call / Security / Computer security / Access control

Indico User Guide CERN Indico User Guide by CERN

Add to Reading List

Source URL: indico.ba.infn.it

Language: English - Date: 2007-05-24 11:59:20
372United States Department of Homeland Security / Counter-terrorism / Crime prevention / Computer Assisted Passenger Prescreening System / Lockheed Martin / Transportation Security Administration / Passenger name record / Privacy Act / Privacy Office of the U.S. Department of Homeland Security / Security / Aviation security / Public safety

Federal Register / Vol. 68, No[removed]Friday, August 1, [removed]Notices GLPAC will meet at the Maritime Institute of Technology Training and Conference Center, 5700 Hammonds Ferry Road, Linthicum Heights, MD 21090, in Roo

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-12-01 12:58:49
373Civil aviation authorities / International Civil Aviation Organization / Supply chain security / Standards And Recommended Practices / Computer security / World Customs Organization / Airport security / United Nations / Security / Safety / Prevention

Keynote Address by ICAO Secretary General Raymond Benjamin to the 22nd IATA AVSEC World Conference Istanbul, Turkey, 5 November[removed]Good morning everyone.

Add to Reading List

Source URL: www.icao.int

Language: English - Date: 2013-11-05 13:13:11
374Computer law / National security / Crime / Cyberterrorism / Legal aspects of computing / Internet-related prefixes / Definitions of terrorism / The Information Technology Act / Information warfare / Cyberwarfare / Computer crimes / Terrorism

1 Lecture in 12th working Session on 28th February,2010 in International Conference of Jurists on Sea: Global Warming & Rule of Law organized by International Council of Jurists at

Add to Reading List

Source URL: catindia.gov.in

Language: English - Date: 2012-07-07 08:24:31
375Authenticated encryption / Initialization vector / Adaptive chosen-ciphertext attack / Block cipher / Padding / Chosen-ciphertext attack / Telnet / Chosen-plaintext attack / Block cipher modes of operation / Cryptography / Espionage / Secure Shell

An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version. Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Pro

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2002-09-20 17:38:46
376Computer law / Notary / Crime prevention / National security / Electronic signature / The Information Technology Act / Information security / Authentication / Digital signature / Security / Cryptography / Law

SPEECH AT IST INTERNATIONAL CONFERENCE ON MANAGEMENT OF TECHNOLOGIES & INFORMATION SECURITY ORGANIZED BY THE IIIT ALLAHABAD ON[removed]By

Add to Reading List

Source URL: catindia.gov.in

Language: English - Date: 2012-07-07 08:24:36
377Computer security / Crime prevention / National security / Secure communication / International Multilateral Partnership Against Cyber Threats / Safety / Security / Computer crimes / Computer network security

WORKSHOPS: NOVEMBER 17 CONFERENCE & EXPO: NOVEMBER 18–19 Gaylord Texan Resort & Convention Center Dallas, Texas

Add to Reading List

Source URL: security-today.com

Language: English - Date: 2014-08-08 14:39:04
378Computer security / Cloud computing / Krautheim / USENIX Annual Technical Conference / Trustworthy computing / Centralized computing / Computing / Security

Building Trust into Utility Cloud Computing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-04-29 22:28:16
379Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Law / Information security / Information privacy / National Institute of Standards and Technology / Security controls / Office of the National Coordinator for Health Information Technology / Computer security / Data security / Security

Conference Day 1: Tuesday May 11, 2010

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-05-13 01:00:00
380Hypertext Transfer Protocol / Honeypot / Log analysis / Computing / Computer network security / Transmission Control Protocol

LOOKING FOR A NEEDLE IS A STACK OF NEEDLES Finding problems before they wake you up at night 16TH ANNUAL NEW YORK STATE CYBER SECURITY CONFERENCE JUNE 2013

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2013-06-11 07:46:40
UPDATE