Digital security

Results: 4317



#Item
171Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
172Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Keystore / Key / Encryption / Digital signature / Certificate authority / PKCS

Private Key Management Version: 1.1 Global Payments Europe, s.r.o. Created

Add to Reading List

Source URL: www.gpwebpay.cz

Language: English - Date: 2016-08-01 14:50:14
173Security / Cyberwarfare / Computer security / Source / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Internet privacy / Internet

This paper appears at the 24th USENIX Security SymposiumInvestigating the Computer Security Practices and Needs of Journalists Susan E. McGregor Tow Center for Digital Journalism Columbia Journalism School

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2015-06-29 14:09:16
174Information science / Computing / Information retrieval / Data management / Cultural globalization / Digital technology / Internet / New media / Telegraphy / Research data archiving / Carl Malamud / National Security Agency

PDF Document

Add to Reading List

Source URL: public.resource.org

Language: English - Date: 2008-11-01 14:03:30
175Video / Digital media / Imaging / Computing / Surveillance / Security engineering / Security / Video management system / Windows Server / IP camera / Closed-circuit television / Server

A&H Software House Inc. Web: www.Luxriot.com Email: LUXRIOT® A & E Specifications / Features Luxriot® VMS is a highly stable software, easy on any network and very easy to deploy with the

Add to Reading List

Source URL: www.luxriot.com

Language: English - Date: 2016-05-08 15:54:40
176

Michael Brunton-Spall Lead Security Architect Government Digital Service @bruntonspall Being secure and agile

Add to Reading List

Source URL: gotocon.com

- Date: 2016-06-21 10:03:54
    177Security / Safety / Prevention / Surveillance / Economic development / Internet of Things / Public policy / Smart city / Sustainable urban planning / Hong Kong / Public transport / Closed-circuit television

    www.thalesgroup.com Thales Position Paper in answer to OGCIO Public Consultation for Hong Kong 2014 Digital 21 Strategy

    Add to Reading List

    Source URL: www.digital21.gov.hk

    Language: English - Date: 2014-01-20 06:40:25
    178

    琉球大学様向け Digital National Security Archive 講習会 2016年7月8日 本日のセッションの内容

    Add to Reading List

    Source URL: www.lib.u-ryukyu.ac.jp

    Language: Japanese - Date: 2016-07-10 20:47:54
      179Library science / Technology / Security / Digital media / Content-control software / Digital rights management / Internet censorship / Internet / Public library / Library / Computer security / Sumter County Library /  FL

      Internet Use Policy It is the intent of the Mesa County Public Library District to provide free, equitable, and organized public access to Internet resources. This access honors the fundamental library principle of intel

      Add to Reading List

      Source URL: mesacountylibraries.org

      Language: English - Date: 2016-06-16 11:47:28
      180Computer access control / Computer security / Identity / Federated identity / Identity management / Authentication / Security token / Digital identity / OpenID / Phishing / Electronic authentication / Mobile signature

      Your Contact is Jason Blum (CEO) +Neunbrunnenstrasse 33 | CH-8050 Zürich www.synacts.com www.digitalid.net

      Add to Reading List

      Source URL: www.synacts.com

      Language: English - Date: 2016-08-02 05:40:35
      UPDATE