Data security

Results: 28926



#Item
841Computer access control / Ubiquitous computing / Wireless / Automatic identification and data capture / Privacy / Radio-frequency identification / Security token / Authentication / Password / Contactless smart card / Multi-factor authentication

Treat ’Em Like Other Devices: User Authentication of Multiple Personal RFID Tags Nitesh Saxena Md. Borhan Uddin

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-18 13:43:33
842Data security / Computer security / Data mining / DARPA / Georgia Tech Research Institute / Anomaly detection / Anomaly Detection at Multiple Scales / Anomaly / Outlier / Benchmark / Synthetic data

SYSTEMATIC CONSTRUCTION OF ANOMALY DETECTION BENCHMARKS FROM REAL DATA Outlier Detection And Description Workshop 2013

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-09-06 10:43:41
843Computer security / Quality / Cryptography / Data security / Information security / National security / Management system

QUALITY AND INFORMATION SECURITY MANAGEMENT SYSTEM POLICY HGC’s Quality and Information Security Policy Statement: Operational standards of efficiency, effectiveness, quality and information security are observed in al

Add to Reading List

Source URL: www.hgc.gov.ph

Language: English - Date: 2016-04-15 11:52:38
844Information privacy / Computer security / Data security / Security / General Data Protection Regulation / Privacy law / IT risk / Regulatory compliance

EU data protection law is changing… Are you ready? Take our GDPR readiness assessment How can we help?

Add to Reading List

Source URL: www1.pwc.ch

Language: English - Date: 2016-07-04 03:04:40
845Data security / Crime prevention / Cryptography / Information governance / National security / Internet of things / Privacy / Internet privacy / Computer security / Cloud computing / Information privacy / Information security

Microsoft WordJuly 12 online.docx

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
846Block ciphers / Data Encryption Standard / Linear cryptanalysis / Advanced Encryption Standard / Q / S-box / ICE / Differential cryptanalysis / VEST / PRESENT / Stream cipher / Key schedule

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
847Data security / Computer security / Security / Crime prevention / Cryptography / Common Criteria / Protection Profile / Security Target / Information security / Evaluation / Evaluation Assurance Level / Cryptographic Module Testing Laboratory

Microsoft Word - CCDevelopersSeminar-marketingOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
848Mass surveillance / Counter-terrorism / Crime prevention / Law enforcement / National security / Investigatory Powers Bill / Regulation of Investigatory Powers Act / Bulk personal datasets / Investigatory Powers Tribunal / Government Communications Headquarters / Global surveillance disclosures / Telecommunications data retention

Investigatory Powers Bill – GUIDE FOR ORG SUPPORTERS The Investigatory Powers Bill (IPB) will give extensive surveillance powers to the UK’s law enforcement and intelligence agencies. It will replace other surveillan

Add to Reading List

Source URL: www.openrightsgroup.org

Language: English - Date: 2016-03-15 10:07:18
849ISO standards / Tests / Common Criteria / Protection Profile / Data security / Common Criteria Testing Laboratory / Security Target / Evaluation Assurance Level / Professional certification / Evaluation / Accreditation / Cryptographic Module Testing Laboratory

Microsoft Word - D01-CC Scheme Organization Management and Operations-Issue-03.docx

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:22:06
850Privacy / Identity management / Identity documents / Data security / Internet privacy / Financial privacy / Personally identifiable information / Bank / GrammLeachBliley Act / California Shine the Light law

RevFACTS What does Sage Bank do with your personal information?

Add to Reading List

Source URL: www.sagebank.com

Language: English - Date: 2016-06-01 15:37:12
UPDATE