Digital security

Results: 4317



#Item
241Public-key cryptography / Key management / Simple public-key infrastructure / Authorization certificate / Public key infrastructure / X.509 / Public key certificate / MD5 / Digital signature / NP / RSA

Journal of Computer Security–322 IOS Press 285 Certificate chain discovery in SPKI/SDSI

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2016-07-18 22:33:05
242Computer network security / Wireless networking / Content-control software / Digital rights management / Internet censorship / Wi-Fi / Computer network / Computer security / Internet access / Emmet / Wireless network / Internet

The Emmet O’Neal Library

Add to Reading List

Source URL: www.eolib.org

Language: English - Date: 2009-10-09 14:19:02
243Analysis of algorithms / Cache / Oblivious ram / Digital signature

2015 IEEE Symposium on Security and Privacy Privacy and Access Control for Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schr¨oder Saarland University & CISPA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:16
244Antivirus software / Malwarebytes / Malware / Computer virus / Avira / Zero-day

C A S E S T U DY Enterprise Elementary School District expels malware Malwarebytes Endpoint Security keeps staff PCs clean, digital curriculum flowing, and students learning

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
245Smartphones / Mobile Malware / Alphabet Inc. / Android / Google Play / Antivirus software / BlackBerry Priv

Android Security and the Elusive HSM Mobile Digital Wallet Security Summit Jon Oberheide Duo Security

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:48
246Cybercrime / National security / Privacy / Computer security / Crime prevention / Internet privacy / Personally identifiable information / Microsoft / Cyberwarfare / Information privacy

EEMA online June 2015 Issue 10 EEMA news EEMA 28th Annual Conference: Digital Enterprise Europe Bringing Trust to the Hyperconnected World: Seize Opportunities and Manage Risk

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
247Identity management / Federated identity / EIDAS / Regulation / Signature / Internet privacy / Privacy / Digital identity / Computer security

EEMA Brief May 2016 Issue 8 EEMA News Trust in a Digital World, 15–16 June, The Hague Trust in a Digital World (TDW) is Europe’s leading, independent, Europeanfocused conference. Worldwide experts will address releva

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-17 07:04:38
248Privacy / Data security / Copyright law / Cryptography / Identity management / P3P / Digital rights management / Personally identifiable information / Internet privacy / Digital Copyright / Digital Millennium Copyright Act / Information security

Towards Realistic Assumptions, Models, and Goals for Security Research (White Paper for NSF Workshop) Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:19
249Computer network security / Port knocking / Port / Firewall / TCP Stealth / Linux / Transmission Control Protocol

TCP Stealth Port Knocking Advanced Dr. Udo Seidel Digital Evangelist & Chief Architect useidel(at)amadeus(dot)com

Add to Reading List

Source URL: www.susecon.com

Language: English - Date: 2015-11-20 11:20:35
250Computer network security / Computer security / Cyberwarfare / Cybercrime / National security / Threat

www.pwc.ch/digitaltrustge2016 Invitation Digital Trust Conference 2016

Add to Reading List

Source URL: old.pwc.ch

Language: English - Date: 2016-02-11 06:14:18
UPDATE