Digital security

Results: 4317



#Item
631Digital media / Application software / Electronic games / Grand Theft Auto IV / Computer network security / Global Technology Associates /  Inc. / Action-adventure games / Windows games

PRESS RELEASE FOR IMMEDIATE RELEASE 3505 Lake Lynda Drive, Suite 109

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-10-09 15:50:06
632Security / Digital media / Sins / Theft / Insurance / Grand Theft Auto IV / Safe / Crimes / Financial institutions / Institutional investors

DOC Document

Add to Reading List

Source URL: www.anglicanchurchsq.org.au

Language: English - Date: 2014-08-11 01:53:59
633Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
634S/MIME / Public key infrastructure / Email / Digital signature / Revocation list / Certificate authority / Web of trust / PKCS / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Securing E­mail with Digital Certificates  Author: Steve Moitozo <> Created: Revised: Revision: 4

Add to Reading List

Source URL: www.geekwisdom.com

Language: English - Date: 2009-02-04 13:42:40
635Information / Password authentication protocol / Peer-to-peer / Cryptographic protocols / Client–server model / Password / Digital credential / Security Support Provider Interface / Internet protocols / Computing / Data

PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-27 18:53:42
636Concurrent computing / Data distribution service / Computer security / Data security / Data center / Cloud computing / Data architecture / Electronic health record / Security service / Data management / Computing / Information technology management

WHITEPAPER Is Your Data Secure? Executive Summary Any organization’s most valuable assets include its digital data. Safeguarding these assets raises questions: which assets require security, and what type of security

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
637Computer hardware / Technology / Modems / Logical Link Control / DSL modem / Universal Serial Bus / Asymmetric digital subscriber line / DSL filter / Wireless security / Digital subscriber line / Electronics / Networking hardware

Comtrend Wireless Modem Guide 2010.qxp

Add to Reading List

Source URL: www.tcc.coop

Language: English - Date: 2011-11-07 10:38:00
638Routing protocols / Public-key cryptography / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Digital signature / Convergence / RSA / Internet / Network architecture / Computing

Simulation Modelling Practice and Theory–216 www.elsevier.com/locate/simpat Evaluation of efficient security for BGP route announcements using parallel simulation David M. Nicol

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:44:25
639War / Digital Video Systems / Academi / Security

DIGITAL ALLY, INC. RECEIVES $5.1 MILLION INTERNATIONAL ORDER FOR DVM-500 IN-CAR VIDEO SYSTEMS LARGEST ORDER IN COMPANY’S HISTORY ASSURES RECORD SALES IN FOURTH QUARTER OF 2007 OVERLAND PARK, Kansas (November 29, 2007)

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2009-08-26 10:54:41
640Cyberwarfare / Applied mathematics / Digital signature / RSA / ID-based encryption / Information security / Elliptic curve cryptography / Cryptography / Public-key cryptography / Security

1 BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems Attila A. Yavuz and Peng Ning Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
UPDATE