Digital security

Results: 4317



#Item
81Technology / Digital media / Security / Digital rights / Ambient intelligence / Internet of things / Internet privacy / Internet / Privacy / E-commerce / Federal Trade Commission / Computer security

IA IoT Comment to NTIA

Add to Reading List

Source URL: internetassociation.org

Language: English - Date: 2016-06-01 16:49:03
82Camera / Live-preview digital cameras

Arlo Wire-free HD Camera Security System No cords. No wires. No worries. From kids and pets to an empty home or after-hours business, you’ve got a lot to keep safe. Day or night, indoors or out,

Add to Reading List

Source URL: www.lowcost-security.ch

Language: English - Date: 2016-02-09 05:20:44
83Security / Prevention / Physical security / Digital media / IP camera / Internet Protocol / Surveillance / Video / Video surveillance / Access control / Napco Security Technologies

Enterprise class access control solutions From our full-featured software, CardAccess 3000, CCTV, DVRs, badging to blazing fast controllers, Continental has been at the forefront in enterprise class access control and s

Add to Reading List

Source URL: www.napcosecurity.com

Language: English - Date: 2014-01-16 14:15:43
84Watermarking / Cryptography / Access control / Digital watermarking / Watermark / Security / Steganography / Ingemar Cox / JPEG / Cinavia / Audio watermark

An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
85

Как украсть миллиард: Вывод денег через уязвимости АБС Илья Медведовский к. т. н. Генеральный директор Digital Security

Add to Reading List

Source URL: ural.ib-bank.ru

Language: Russian - Date: 2016-02-24 08:20:19
    86

    № 1 в аудите безопасности Исследовательский центр Digital Security Research Group (http://www.dsecrg.ru), открытый компанией Digital Security в 2007 году

    Add to Reading List

    Source URL: dsec.ru

    Language: Russian - Date: 2016-08-18 08:29:41
      87Internet privacy / Computing / Computer security / Privacy / HTTP cookie / Digital media / Personally identifiable information / Medical privacy / P3P / Zombie cookie

      Microsoft Word - privacy-policy-template.docx

      Add to Reading List

      Source URL: www.bestdefender.com

      Language: English - Date: 2015-08-24 22:11:39
      88Equipment / Security / Vision / Cameras / Surveillance / Digital cameras / Road traffic management / Closed-circuit television

      Camera technology by Alexia Lane EYE ON THE WORLD

      Add to Reading List

      Source URL: s.campbellsci.com

      Language: English - Date: 2016-07-25 08:23:15
      89Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

      Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

      Add to Reading List

      Source URL: security-lab.jaist.ac.jp

      Language: English - Date: 2015-11-23 04:37:54
      90Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Cyberwarfare / Atos / Computer security / Internet privacy / Internet

      EEMA online September 2015 Issue 15 Dates for your diary 7 October Re-inventing your Business through Digital

      Add to Reading List

      Source URL: www.eema.org

      Language: English - Date: 2016-05-13 04:17:09
      UPDATE