Computer security conference

Results: 514



#Item
41Searches and seizures / Privacy of telecommunications / Computer network security / Cyberwarfare / Fourth Amendment to the United States Constitution / Electronic Communications Privacy Act / Search warrant / Patriot Act / Riley v. California / Probable cause / Search and seizure / Computer security

Written Statement Of The Center for Democracy & Technology Before The Judicial Conference Advisory Committee on Criminal Rules

Add to Reading List

Source URL: cdt.org

Language: English - Date: 2014-10-24 15:56:12
42Cryptography / Criminology / Forensic science / Heuristics / Online and offline / Computer security / Art forgery

Call for Participation Signature Verification Competition On- and Offline Skilled Forgeries http://sigcomp09.arsforensica.org 10th International Conference on Document Analysis and Recognition

Add to Reading List

Source URL: www.cvc.uab.es

Language: English - Date: 2009-01-20 10:13:08
43Security / Cybercrime / Cyberwarfare / National security / Computer network security / Computer security / Cryptography

STRENGTHEN YOUR LEADERSHIP IN THE CYBER WORLD STRENGTHEN THE NATION IN THE PROCESS For decades, the Air Force Information Technology Conference was a must-attend event for Air Force IT experts and the companies who do b

Add to Reading List

Source URL: www.afitc-event.com

Language: English - Date: 2016-04-26 12:13:01
44Computing / Security / Technology / Formal sciences / Emerging technologies / Big data / Data management / Technology forecasting / Transaction processing / Internet privacy / Artificial intelligence / Computer security

STM TECH TRENDS Outlook 2020 launched 28 April 2016 STM US Annual Conference 28 April 2016

Add to Reading List

Source URL: www.stm-assoc.org

Language: English
45Privacy / Digital rights / Human rights / Identity management / Data security / Law / Internet privacy / Information privacy / Expectation of privacy / Personally identifiable information / Computer security / Medical privacy

The User in User Privacy An STM User Privacy WG Perspective IJsbrand Jan Aalbersberg – Elsevier STM US Annual Conference 2016 Washington - April 28, 2016

Add to Reading List

Source URL: www.stm-assoc.org

Language: English
46Computer forensics / AT Attachment / Host protected area / Information technology audit / Center for Advanced Security Research Darmstadt / Device configuration overlay / Baier / International Monetary Fund / Anti-computer forensics / IMF

AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASED

Add to Reading List

Source URL: www.imf-conference.org

Language: English - Date: 2014-05-21 12:58:53
47

DEMOGRAPHIC INFORMATION RMISC 2015 Conference Demographics* 769 Registrants Industry Business Services Computer Security

Add to Reading List

Source URL: www.rmisc.org

Language: English - Date: 2016-02-23 12:59:33
    48Cyberwarfare / Cryptography / Spyware / National security / Rootkits / Malware / Backdoor / Computer security

    Challenges of Coordinated Linux & Android Intrusions IMF 2014 Eoghan Casey May 12, 2014

    Add to Reading List

    Source URL: www.imf-conference.org

    Language: English - Date: 2014-05-21 12:58:37
    49

    Appeared at the 12th ACM Conference on Computer and Communications Security, NovAggregated Path Authentication for Efficient BGP Security

    Add to Reading List

    Source URL: www.ists.dartmouth.edu

    Language: English - Date: 2008-09-11 13:38:52
      50

      Presented at the National Security Agency’s third High Confidence Software and Systems Conference, Baltimore MD, April 2003 Introducing Cyberlogic? Harald Rueß and Natarajan Shankar Computer Science Laboratory

      Add to Reading List

      Source URL: www.csl.sri.com

      Language: English - Date: 2015-04-22 13:40:33
        UPDATE