Digital security

Results: 4317



#Item
611Data management / Search algorithms / Information / Security / Cryptography / Digital watermarking / Database / Relational database / Hash function / Watermarking / Database theory / Database management systems

Database Forensics in the Service of Information Accountability Kyriacos E. Pavlou Department of Computer Science The University of Arizona P.O. Box

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2011-11-15 03:32:08
612Key management / Computer security / Digital signature / Electronic signature / Non-repudiation / X.509 / Public key infrastructure / Signature / Public key certificate / Cryptography / Public-key cryptography / Notary

PDF Document

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:39
613Civil law / Digital signature / Notary / Key / Security / Cyberwarfare / Key management / Public-key cryptography / Cryptography

DIRECTIONS: KEY REQUEST FORM UNIVERSITY OF NEW HAVEN 1.

Add to Reading List

Source URL: www.newhaven.edu

Language: English
614Wavelets / Security / Wavelet / Watermark / Steganography / Printing / Watermarking / Digital photography / Digital watermarking

SECOND GENERATION IMAGE WATERMARKING IN THE WAVELET DOMAIN Thesis submitted for the degree of Doctor of Philosophy to the School of Sciences in the University of Buckingham

Add to Reading List

Source URL: herbert.the-little-red-haired-girl.org

Language: English - Date: 2011-06-06 16:51:24
615Network architecture / Electronics / Internet privacy / Online chat / Internet / New media / Peer-to-peer / Virtual private network / Instant messaging / Computing / Digital media / Computer network security

Nusoft Newsletter – IR Series No.28 Tech Overview : Advanced Authentication Management for IT Administrators

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:27
616Computer network security / Cryptographic protocols / Electronics / Internet / Networking hardware / G.992.5 / Wireless security / Home network / Asymmetric digital subscriber line / Digital subscriber line / Computing / Wi-Fi

MediaAccess TG582n Wireless n Multi-User ADSL2+ Gateway  telecom

Add to Reading List

Source URL: www.nerim.fr

Language: English - Date: 2014-01-15 05:32:19
617Windows games / Computing / Software / Grand Theft Auto IV / Computer network security / Global Technology Associates /  Inc. / Digital media / Action-adventure games

PRESS RELEASE FOR IMMEDIATE RELEASE 3505 Lake Lynda Drive, Suite 109

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-10-09 15:50:06
618Security / Passport / Paperless office / Microsoft Access / Digital signature / Portable Document Format / Russian passport / Cryptography / Electronic documents / Computing

Access Passport PRODUCT DATASHEET Overview Benefits

Add to Reading List

Source URL: www.accessefm.com

Language: English
619Digital media / Application software / Electronic games / Grand Theft Auto IV / Computer network security / Global Technology Associates /  Inc. / Action-adventure games / Windows games

PRESS RELEASE FOR IMMEDIATE RELEASE 3505 Lake Lynda Drive, Suite 109

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-10-09 15:50:06
620Social psychology / Sociology / Trust / Behavior / Ethology / Social philosophy / Accountability / Reputation management / Social epistemology

Trust in Digital Life Research and Innovation Community Trust is an essential pre-requisite for connecting people in effective transactions. It builds in our society on elements like security, privacy, transparency, acco

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2014-06-11 07:22:00
UPDATE