Digital security

Results: 4317



#Item
231Public-key cryptography / Cryptography / Public key infrastructure / Encryption / Attribute-based encryption / PKE / Digital signature / Side-channel attack / RSA

Hello everybody ! See you at the next conference!

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
232Broadband / Data centers / E-commerce / Colocation centre / Internet hosting / Web hosting / Internet access / Voice over IP / Internet / Telephony / Computer security / Multiprotocol Label Switching

Telecommunications for your business In a world that is constantly online, there is a need for tried and tested tools to meet the challenges of digital reality.

Add to Reading List

Source URL: en.atman.pl

Language: English - Date: 2016-07-26 11:11:39
233Information technology management / National security / E-commerce / Computer network security / Computer security / Cryptography / Software / Business process management

Microsoft Word - This Time The Gathering Storm is Digital.doc

Add to Reading List

Source URL: ontopilot.com

Language: English - Date: 2016-03-21 13:58:05
234Mobile computers / Wireless networking / Information appliances / Bluetooth / Wireless / Wi-Fi / Medical device / IHealth / Computer security / Personal digital assistant

Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices Vahab Pournaghshband David Meyer

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2014-11-18 00:47:59
235Energy economics / Home automation / Building automation / Environmental technology / Lighting / Efficient energy use / Lighting control system / Computer network / Energy policy / Computer security / Energy industry / Internet of things

Background Discussion for July 6 IEA Workshop on Digital Networks — www.iea.org/Textbase/events Buildings as Networks: Danger, Opportunity, and Guiding Principles for Energy Efficiency Alan Meier and Bruce Nordman1, L

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2007-11-15 16:35:32
236Privacy / Identity management / Digital rights / Human rights / Privacy engineering / Security engineering / Internet privacy / Medical privacy / Information privacy / Privacy Impact Assessment

Privacy by Design-Engineering Privacy Workshop 3 Report Executive Summary Within the last few years, privacy experts in industry, government and academia have called for new thinking that enables engineering privacy into

Add to Reading List

Source URL: cra.org

Language: English - Date: 2015-12-30 13:06:46
237Surveillance / Video surveillance / Crime prevention / Physical security / Video / Closed-circuit television / NVR / Red Digital Cinema Camera Company / Axis Communications

Figure1_Basic Network Layout

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2011-10-02 23:39:38
238Cloud infrastructure / Computer security / Cloud computing / Access control

Networking concept: Cloud With Padlock on digital background

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2016-02-24 15:28:02
239Public-key cryptography / Cryptography / Key management / DNSSEC / Domain Name System Security Extensions / Cryptographic hash function / Cryptosystem / Digital signature / Book:Cryptography / Index of cryptography articles

An Overview of DNSSEC August 04, 2011. Carlos Martínez-Cagnazzo carlos @ lacnic.net

Add to Reading List

Source URL: www.labs.lacnic.net

Language: English - Date: 2011-09-08 15:41:30
240Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
UPDATE