Digital security

Results: 4317



#Item
351

An OPC UA-based approach for dynamic-configuration of security credentials and integrating a vendor independent digital product memory Marco Blume1, Nils Koch2, Jahanzaib Imtiaz2, Dr. Holger Flatt2, Prof. Dr. Jürgen Jas

Add to Reading List

Source URL: www.hs-owl.de

Language: English
    352Cryptography / Public-key cryptography / Key management / Key / Public key infrastructure / Elliptic curve cryptography / Digital signature / Smart grid / Meter data management / Symmetric-key algorithm / Computer security / Smart meter

    Certicom AMI 7000 data sheet-front-rev10

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2009-06-02 19:28:55
    353Computing / Networking hardware / Technology / Wireless networking / Digital subscriber line / Server appliance / Linux-based devices / Wireless router / DSL modem / Wi-Fi / Router / Wireless security

    N150 Wireless ADSL2+ Modem Router DGN1000 User Manual

    Add to Reading List

    Source URL: pawlan.com

    Language: English - Date: 2012-02-01 17:59:56
    354

    Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode Jinwoo LEE and Pil Joong LEE┼ Information security lab., POSTECH • SSR 2014: Security Standardisation Research

    Add to Reading List

    Source URL: ssr2015.com

    Language: English - Date: 2015-06-22 06:35:53
      355Digital media / Port scanner / Technology / Internet / Computing

      ZMap Fast Internet-Wide Scanning and its Security Applications Zakir Durumeric Eric Wustrow J. Alex Halderman

      Add to Reading List

      Source URL: zmap.io

      Language: English - Date: 2014-12-10 12:42:37
      356Software / Free software / Digital rights / Human rights / Web browsers / Internet privacy / Privacy / Firefox / Alexander Raake / Mozilla

      Because we care: Privacy Dashboard on Firefox OS Marta Piekarska (Technische Universitat Berlin), Yun Zhu (Technische Universitat Berlin), Dominik Strohmeier (Mozilla Corporatiion),

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-05-26 10:27:01
      357Privacy / Digital rights / Human rights / Identity management / Law / Internet privacy / Information privacy / Financial privacy / Identity theft

      Paying for Privacy: Consumers & Infrastructures Adam Shostack Presented at 2nd Workshop on Security and Economics

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 11:44:04
      358

      Drucker Challenge 2015: Managing Oneself in the Digital World 5 Key Challenges for Building, Managing and Leading a Hybrid Workforce Introduction "IN THE FUTURE, WHEN MICROSOFT LEAVES A SECURITY-FLAW IN THEIR CODE IT

      Add to Reading List

      Source URL: www.druckerchallenge.org

      Language: English - Date: 2015-08-31 04:35:18
        359Computer hardware / Computer data storage / Non-volatile memory / Computing / Computer memory / Computer storage devices / Computer storage media / Embedded Linux / YAFFS / Flash memory / Solid-state drive / Secure Digital

        Security Analysis of Android Factory Resets Laurent Simon https://www.cl.cam.ac.uk/~lmrs2/

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2015-05-30 16:28:22
        360Computing / Digital rights / Internet / Digital media / Law / Content-control software / Internet security / Right to Internet access / Internet censorship / Anonymity / Internet privacy / Tor

        Welcome to the World of Human Rights: Please Make Yourself Uncomfortable Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, Connecticut, U.S.A. Email: {henry.corrigan-gibbs, bryan.ford}@yale.edu

        Add to Reading List

        Source URL: dedis.cs.yale.edu

        Language: English - Date: 2013-04-01 10:05:09
        UPDATE