Digital security

Results: 4317



#Item
531Infrastructure / United States Department of Homeland Security / Security / Humanitarian aid / Resilience / Critical infrastructure protection / Psychological resilience / Critical infrastructure / National security / Public safety / Emergency management

Global digital mesh network, vector illustration

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2015-05-25 22:01:44
532Cryptography / Science / Knowledge / Mathematical sciences / Cryptanalysis / Cryptology

Formally Certifying the Security of Digital Signature Schemes

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
533Electronic documents / Email / Public key infrastructure / Digital signature / WISeKey / Security token / Cryptography / Public-key cryptography / Key management

m-Identity Protection Trusted Message Sign The signature app for your transactions!

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2015-04-27 11:53:34
534Electronic signature / Notary / Uniform Electronic Transactions Act / Digital signature / Signature / Medical transcription / Cryptography / Computer law / Security

[Electronic Signature policies] – [Topic: Electronic Signature Policies

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
535Technology / Digital divide / Ethics / International Telecommunication Union / United Nations Development Group / Information security / Privacy / Computer security / Network security / Security / Crime prevention / National security

INTERNATIONAL TELECOMMUNICATION UNION

Add to Reading List

Source URL: files.wcitleaks.org

Language: English - Date: 2012-07-03 14:42:25
536Unemployment in the United States / Independent living / Disability / Medicine / Texas Department of Assistive and Rehabilitative Services / Health / Florida Division of Vocational Rehabilitation / Disability rights / Social Security / Ticket to Work

Disabled woman with Digital Tablet

Add to Reading List

Source URL: www.dars.virginia.gov

Language: English - Date: 2014-04-02 11:48:23
537Warez / Tagès / Public-key cryptography / Advanced Access Content System / Cryptography / Digital rights management / Copy protection

Pro:Idiom System Description Introduction and Summary The Zenith Electronics copy protection system (Pro:Idiom) provides end-to-end cryptographic security for protecting digital HD and SD video (including movies) and mus

Add to Reading List

Source URL: www.zenith.com

Language: English - Date: 2013-05-01 11:11:51
538Computer security / Data security / Actuarial science / Risk analysis / Risk / Information security / IT risk / Emergency management / IT risk management / Security / Management / Public safety

Cyber and Data Risk Evaluating Program Effectiveness and Examination Readiness Digital Commerce & Payments Series Webinar February 4, 2015

Add to Reading List

Source URL: www.buckleysandler.com

Language: English - Date: 2015-03-18 15:54:54
539Civolution / Digital video fingerprinting / Identification / Teletrax / Fingerprint / Access control / Watermark / Acoustic fingerprint / Digital watermarking / Acoustic fingerprinting / Watermarking / Security

fiche tek20 TTX SPECIFICATIONS - copie.indd

Add to Reading List

Source URL: www.civolution.com

Language: English - Date: 2015-02-03 11:44:16
540Ring signature / Designated verifier signature / Zero-knowledge proof / NP / Undeniable signature / Commitment scheme / IP / Public-key cryptography / Probabilistically checkable proof / Cryptography / Digital signature / Proof of knowledge

Non-interactive Designated Verifier Proofs and Undeniable Signatures Caroline Kudla? and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, UK {c.j.kudla,kenny.paterson}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-06 11:06:02
UPDATE