Digital security

Results: 4317



#Item
301Technology / Digital media / Prevention / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Counter-terrorism / Terrorism / Internet Governance Forum

EU Internet Forum Preparation of the High level launch event of the EU Internet Forum I. Scene setter The European Agenda on Security announced the launch of an EU-level Forum with IT companies to more effectively counte

Add to Reading List

Source URL: edri.org

Language: English - Date: 2016-03-08 08:21:53
302Privacy / Digital rights / Human rights / Identity management / Data security / Law / Internet privacy / Information privacy / Expectation of privacy / Personally identifiable information / Computer security / Medical privacy

The User in User Privacy An STM User Privacy WG Perspective IJsbrand Jan Aalbersberg – Elsevier STM US Annual Conference 2016 Washington - April 28, 2016

Add to Reading List

Source URL: www.stm-assoc.org

Language: English
303

Navigating Unmountable Media with the Digital Forensics XML
 File System Alex J. Nelson NIST, Computer Security Division CurateGear

Add to Reading List

Source URL: ils.unc.edu

Language: English - Date: 2016-01-14 08:18:20
    304Hacking / Web design / Digital typography / News aggregators / Social engineering / Cross-site scripting / Cross-site request forgery / NoScript / Content Security Policy / JavaScript / Clickjacking / Cascading Style Sheets

    Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2012-08-16 02:39:46
    305Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

    Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-03-20 08:39:27
    306

    Security concept: Lock on digital screen

    Add to Reading List

    Source URL: www.dke.de

    Language: English - Date: 2015-11-27 04:53:02
      307Information science / Archival science / Documents / Microform / Storage media / Media technology / Library science

      DiAlogue Digital to Analogue Digital to Analogue conversation system. Provides the security of 500 year true archival life, by producing 35mm microfilm in monochrome or colour, from a very wide range of digital image fil

      Add to Reading List

      Source URL: 212.159.70.46

      Language: English - Date: 2012-01-24 10:57:39
      308Computing / Digital rights / Human rights / Prevention / Privacy / Identity management / Law / Paul Dourish / Humancomputer interaction / Internet privacy / P3P / Ubiquitous computing

      HUMAN–COMPUTER INTERACTION, 2006, Volume 21, pp. 319–342 Copyright © 2006, Lawrence Erlbaum Associates, Inc. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena

      Add to Reading List

      Source URL: www.dourish.com

      Language: English - Date: 2008-06-14 12:49:39
      309Internet / Domain name system / Computing / .nl / Botnet / Domain name / Country code top-level domain / .org / Top-level domain / Domain registration / .nu / .eu

      Master Thesis as part of the major in Security & Privacy at the EIT Digital Master School SIDekICk SuspIcious DomaIn Classification

      Add to Reading List

      Source URL: www.sidnlabs.nl

      Language: English - Date: 2016-04-12 04:39:02
      310Identity management / Computer access control / Federated identity / Metadata standards / Identity assurance / SAML 2.0 / OpenID / Security Assertion Markup Language / Authentication / Identity provider / Privacy-enhancing technologies / Digital identity

      Toward Mending Two Nation-Scale Brokered Identification Systems

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2015-05-15 18:39:32
      UPDATE