Digital security

Results: 4317



#Item
501Technology / Digital media / American Association of State Colleges and Universities / North Central Association of Colleges and Schools / University of Arkansas at Monticello / Computer network / Authorization / Internet / Computer security / Security / Crime prevention / National security

Computer Usage Policy Introduction The University provides an opportunity for students and other members of the UAM community to enhance their educational experiences and expand their academic knowledge by making availab

Add to Reading List

Source URL: uam-web2.uamont.edu

Language: English - Date: 2015-03-18 09:33:01
502Computer network security / Electronic commerce / Public key certificate / Software protection dongle / Virtual private network / Cryptography / Public-key cryptography / Key management

Procedure to Register DC issued by NICCA for a VPN Connection 1. Get a Digital Certificate from NICCA by filling the DSC Request form available at the following link, http://nicca.nic.in/pdf/DSC-Request-Form.pdf and sub

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2012-09-12 00:51:02
503Fingerprint / Human anatomy / Identification / Security / Computing / Demosaicing / Public key fingerprint / Digital camera / JPEG / Fingerprints / Digital photography / Biometrics

Sensor Noise Camera Identification: Countering Counter-Forensics

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2009-12-18 20:54:42
504Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-03-09 14:36:12
505Linux-based devices / Digital media / Mobile content / Universal Plug and Play / Hacking / Linksys / OpenWrt / Broadcom / Vulnerability / Software / System software / Computing

DefenseCode Security Advisory Broadcom UPnP Remote Preauth Code Execution Vulnerability www.defensecode.com

Add to Reading List

Source URL: www.defensecode.com

Language: English - Date: 2013-01-31 02:08:46
506Root certificate / Public key certificate / Security / Computer security / Certificate authority / Public-key cryptography / Key management / Cyberwarfare

Name of the Document Installing CA Root Certificates and User Digital Certificate Platform

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-03-07 01:21:56
507Identification / Security / Fingerprint / Human anatomy / Anatomy / Digital camera / Information / JPEG / Camera / Biometrics / Fingerprints / Digital photography

Distinguishing Digital Image Origin via Higher Order Statistics

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2009-01-01 13:05:18
508Electronic engineering / Cryptography / Television / Television technology / DVB-CPCM / Digital Video Broadcasting / Block cipher modes of operation / DVB-C / Initialization vector / DVB / Broadcast engineering / MPEG

TSV1Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 5: CPCM Security Toolbox

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2011-02-18 09:44:13
509European Space Agency / Planetary science / Remote sensing / Global Monitoring for Environment and Security / TerraSAR-X / Digital elevation model / COSMO-SkyMed / Sentinel / Earth / Cartography / Spaceflight

The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XL-7/W3, 2015 36th International Symposium on Remote Sensing of Environment, 11–15 May 2015, Berlin, Germany SAT

Add to Reading List

Source URL: www.int-arch-photogramm-remote-sens-spatial-inf-sci.net

Language: English - Date: 2015-04-30 09:54:28
510Mass surveillance / Privacy of telecommunications / Crime prevention / Law enforcement / Foreign Intelligence Surveillance Act / National Security Agency / Patriot Act / Privacy / NSA warrantless surveillance controversy / National security / Security / Surveillance

GOVERNMENT SURVEILLANCE AND THE RIGHT TO PRIVACY OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS CONSULTATION ON “THE RIGHT TO PRIVACY IN THE DIGITAL AGE” April 1, 2014 About the Center for Democracy & Technology

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2014-04-08 14:27:20
UPDATE