Computer surveillance

Results: 1478



#Item
31Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
32Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Security guard / Surveillance / Computer security / Training

JOB POSTINGSECURITY AGENT CORE EXPECTATIONS • The Rose Quarter Security Team is responsible for the 24/7 physical security of the campus • Demonstrate a commitment to safety and seamless performance

Add to Reading List

Source URL: www.rosequarter.com

Language: English - Date: 2016-07-01 14:39:58
33Security / Surveillance / Prevention / Safety / Video / Physical security / Video management system / IP camera / NVR / Closed-circuit television / Computer data storage / Storage area network

Figure1_Basic Network Layout

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2014-09-30 05:38:09
34Security / Prevention / Biometrics / Identification / Surveillance / VMware ESXi / Computer security

2016 HTCIA Conference STUDENT POSTER PRESENTATIONS Greater Mobile Device Security Through Multimodal Biometrics By Yu Liu and Nicholas Smith California State University, Fullerton

Add to Reading List

Source URL: conference.htcias.com

Language: English - Date: 2016-08-02 13:09:20
35Avionics / Aircraft instruments / Avidyne Corporation / Technology / Software / Computer architecture / Glass cockpit / Automatic dependent surveillance  broadcast / Fltplan.com / Android / Draft:Foreflight / Avidyne Entegra

FOR IMMEDIATE RELEASE Contact: Carole Mackay FltPlan.com

Add to Reading List

Source URL: flttrack.fltplan.com

Language: English - Date: 2016-03-25 11:27:07
36Privacy of telecommunications / Technology / Prevention / National security / Computer network / Telephone tapping / Electronic Communications Privacy Act / Surveillance / Privacy / Internet / Pen register / Lawful interception

IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-06-07 13:58:45
37Security / Cryptography / Identification / Access control / Biometrics / Surveillance / Computer access control / Authentication

Biometric Attendance Authentication System (Employee User Manual) 1. Dashboard 1.1 Organization: Total Organization registered in the system with their details. 1.2 Registered Employees: Organization wise Registered Empl

Add to Reading List

Source URL: surveyofindia.attendance.gov.in

Language: English - Date: 2015-02-20 06:43:35
38Espionage / Cyberwarfare / Rogue software / Cybercrime / Computing / Identity theft / Keystroke logging / Spyware / Surveillance / Screenshot / Computer keyboard / Internet privacy

Defeat Spyware With Anti-Screen Capture Technology Using Visual Persistence Johnny Lim Netrust 10 Collyer Quay, #09-05 Ocean Building, Singapore

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
39Cryptography / Crime prevention / National security / Encryption / Computer security / Internet privacy / National Security Agency / End-to-end encryption / Surveillance / Crypto Wars / Export of cryptography from the United States

PDF Document

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-07-05 08:45:24
40Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
UPDATE