Digital security

Results: 4317



#Item
451

2014 IEEE Security and Privacy Workshops DF-C²M²: A Capability Maturity Model for Digital Forensics Organisations Ebrahim Hamad Al-Hanaei

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:12:28
    452

    2014 IEEE Security and Privacy Workshops Gringotts: Securing Data for Digital Evidence Catherine MS Redfield Hiroyuki Date

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2014-04-30 03:12:54
      453

      RAPID EYE™ HYBRID HD 16-CHANNEL HYBRID HIGH DEFINITION DIGITAL VIDEO RECORDER (DVR) SYSTEM WITH VIDEO ANALYTICS OPTION The Rapid Eye™ Hybrid HD 16-channel DVR is designed for effective remote access, even over limite

      Add to Reading List

      Source URL: www.security.honeywell.com

      Language: English - Date: 2013-04-23 09:05:53
        454

        2013 IEEE Security and Privacy Workshops Digital Forensic Reconstruction of A Program Actions Ahmed F.Shosha, Lee Tobin and Pavel Gladyshev School of Computer Science and Informatics University College Dublin

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2013-05-05 16:04:58
          455

          Countdown to Zero Day Stuxnet and the Launch of the World’s First Digital Weapon With Author & Journalist Kim Zetter Presented by the Institute for Science and International Security (ISIS) and The George Washington Un

          Add to Reading List

          Source URL: isis-online.org

          Language: English - Date: 2015-04-08 14:31:34
            456

            2013 IEEE Security and Privacy Workshops “I hereby leave my email to...”: Data Usage Control and the Digital Estate Position Paper Stephan Micklitz∗ , Martin Ortlieb† , Jessica Staddon‡

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2013-05-05 16:04:48
              457

              Credential Design in Attribute-Based Identity Management 1 Gergely Alpár Radboud University Nijmegen, ICIS Digital Security and TNO Security, The Netherlands

              Add to Reading List

              Source URL: www.cs.ru.nl

              Language: English - Date: 2013-07-05 10:19:11
                458

                Improving The Exact Security Of Digital Signature Schemes Silvio Micali Leonid Reyzin ∗

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2007-06-21 10:06:05
                  459

                  Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

                  Add to Reading List

                  Source URL: oakland09.cs.virginia.edu

                  Language: English - Date: 2009-05-18 10:50:30
                    460

                    2009 Paper 7 Question 13 Security Many critical industries, such as electricity, water, oil and gas, have plant controlled by complex digital systems. These “Supervisory Control and Data Acquisition” (SCADA) systems

                    Add to Reading List

                    Source URL: www.cl.cam.ac.uk

                    Language: English - Date: 2014-06-09 10:18:30
                      UPDATE