Digital security

Results: 4317



#Item
551Parity of a permutation / Permutations / Model theory / Cryptographic hash functions / Homomorphic signatures for network coding / Mathematics / Group theory / Parity

Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English
552ISO/IEC 27001 lead auditor / ISO/IEC 27001 / Mesoamerican calendars

2015 Cyber Security Training Schedule 2015 Cyber Security Training Schedule Fundamental/Introduction 1 Critical Infrastructure Protection 2 Digital Forensics Essential Malaysia Common Criteria 1.0 (MyCC) - Understanding

Add to Reading List

Source URL: www.cyberguru.my

Language: English - Date: 2015-03-01 20:38:14
553Computer hardware / Software / Android / Nexus One / Samsung Galaxy S / Secure Digital / HTC Desire S / HTC Desire / Universal Serial Bus / Smartphones / Android devices / Computing

Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-25 04:32:40
554Digimarc / Digital watermarking / Safenet / American wine / Entrust / RSA / InterTrust Technologies / Cryptography / Security / Computer security

Security Brief Friday May 17, 2002 Company News Recent Investments Bluesocket (wireless security) $16m B round

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
555System software / Cloud clients / Android / Embedded Linux / IPhone / Digital rights management / APK / Installation / Debian / Software / Smartphones / Computing

System Software for Developer Release Note (Ver.D1System Software for Developer Overview Due to security reasons, the debug function for the MOVERIO BT-200 system software for consumer is disabled. We have spec

Add to Reading List

Source URL: tech.moverio.epson.biz

Language: English - Date: 2015-03-24 21:56:44
556Computer network security / Crime prevention / National security / Data security / Information security / Trusted computing base / Trusted Computer System Evaluation Criteria / Authorization / Vulnerability / Security / Computer security / Cyberwarfare

IJIS: 3–13 / Digital Object Identifier (DOIs102070100003 Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:24
557Identity / Identity theft / Theft / Social Security / Grand Theft Auto IV / Law / Application software / Taxation in the United States / Digital media / Crimes

From KSAT.com February 28, 2007 KSAT.com AG: Counties Get 60-Day Buffer To Clear Public Records

Add to Reading List

Source URL: gov.propertyinfo.com

Language: English - Date: 2008-02-07 12:11:02
558Commissioner / Government / Linguistics / Digital Opportunity Investment Trust / Digital broadcasting / United States Department of Homeland Security

Microsoft Word - Oct 1 ITC Minutes APPROVED.doc

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2014-05-21 15:39:35
559Computer network security / Software testing / Hacking / Vulnerability / Mandriva Linux / Zero-day attack / WordPress / Debian / Cross-site scripting / Software / Computer security / Cyberwarfare

March April 7, 2015 The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors

Add to Reading List

Source URL: www.informationwarfarecenter.com

Language: English - Date: 2015-04-06 16:36:04
560Smartphones / Cloud clients / Computing / Software / Mac OS X / IOS / Xbox 360 system software / Copyright law / Digital rights management / Computer architecture

How to Modify the System Software for Developer 1. Introduction Due to security reasons, the debug function for the MOVERIO BT-200 system software for consumer is disabled. We have special system software with debug func

Add to Reading List

Source URL: tech.moverio.epson.biz

Language: English - Date: 2015-03-24 21:56:43
UPDATE