Cryptography

Results: 21893



#Item
381Security / Prevention / National security / Safety / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / Recreational Software Advisory Council / Critical infrastructure

PANELISTS: SESSION ID: SPO02-T11 Ammar Alkassar

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2016-03-23 13:52:21
382Computer security / Law / Cryptography / Human rights / Business law / Copyright law / Trusted Computing / Health Insurance Portability and Accountability Act / Privacy / Medical privacy / Trusted system / Internet privacy

This is the second part of HW5

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2008-11-18 08:01:23
383Law in the United Kingdom / Cryptography / Legal professions / Common law / Law / Occupations / Bar of England and Wales / Barrister / Solicitor / Public key certificate / Bankruptcy / Fiji

EXPRESSION OF INTEREST in a position as a Judicial Officer on Fiji’s Courts or Tribunals [please provide the information requested and answer the following questions] Title 1.

Add to Reading List

Source URL: www.judiciary.gov.fj

Language: English - Date: 2015-04-19 20:48:39
384Cryptography / Legal entities / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Good standing / Limited liability company

HOW TO REQUEST LETTERS OF GOOD STANDING Send a letter requesting a letter of good standing regarding the company status and request that the response be sent to you with a copy to the CTNext contact : Jessica Dodge CTNe

Add to Reading List

Source URL: ctnext.com

Language: English - Date: 2016-05-10 14:11:38
385Security / Computer security / Cyberwarfare / Computer network security / Web applications / Cryptography / Secure communication / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
386Medical law / Security / Economy / Crime prevention / Cryptography / Information governance / National security / Medical privacy / Protected health information / Insurance / Power of attorney / Privacy

Release of Medical Information rev2015

Add to Reading List

Source URL: studenthealth.missouri.edu

Language: English - Date: 2016-07-20 17:04:00
387Cryptography / Mathematical proof

Implementing the Groth-Sahai Proof System Advisor(s): David Derler, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
388Computer access control / Cryptography / Obfuscation / Identity management / Password / Security / Cybercrime / Crypt / Phishing / Password strength / Password manager

Microsoft Word - Context Sensitive Password.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-29 23:54:55
389Cryptography / Records management technology / Signature / Electronic documents / Public-key cryptography / Electronic signature / Digital signature / Document / Receipt / Electronic Signatures in Global and National Commerce Act / Legal instrument / Uniform Electronic Transactions Act

Microsoft WordLaw on Electronic Document.doc

Add to Reading List

Source URL: www.nekretnine.co.me

Language: English - Date: 2013-07-17 07:55:17
390Cryptography / Corporate law / Economy / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Articles of incorporation / Insurance / Professional certification / Incorporation

INSTRUCTIONS FOR COMPLETING THIS APPLICATION

Add to Reading List

Source URL: www.tibh.org

Language: English - Date: 2015-11-02 10:38:49
UPDATE