Privacy engineering

Results: 1416



#Item
611Electronic engineering / Human–computer interaction / Wireless / Privacy / Impinj / Antenna / Ultra high frequency / Bulk reading / Omni-ID / Technology / Automatic identification and data capture / Radio-frequency identification

RFID Products UHF IC Tag and Reader/Writer Products OIKAWA Yoshinori Abstract As was pointed out in the “ICT International Competitiveness Enhancement Program” established by the Japanese

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:37:10
612Automatic identification and data capture / Electronic engineering / Privacy / Wireless / HID Global / Guard RFID Solutions Inc. / ODIN technologies / Radio-frequency identification / Human–computer interaction / Technology

Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society Asset Management Solution Based on RFID By Toshiyuki TSUJI,* Seiji KOUNO,† Jun NOGUCHI,‡ Masao IGUCHI,‡ Narihiro MISU‡ and Masa

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:34:51
613Embedded systems / Automatic identification and data capture / Privacy / Radio-frequency identification / Ambient intelligence / Mobile phone / NEC / Middleware / Grid computing / Technology / Electronic engineering / Wireless

Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society NEC’s Activities for Creating a Ubiquitous Network Society By Koichi IKUMI*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:34:30
614Risk management / Safety engineering / Safety / Privacy / National security / Internet privacy / Emergency management / Human security / Safety culture / Ethics / Risk / Management

Invited Talk: Governing the Safety State Charles D. Raab University of Edinburgh Presented at the International Conference of the PRESCIENT Project

Add to Reading List

Source URL: prescient-project.eu

Language: English - Date: 2012-12-03 10:51:51
615Crime prevention / Security engineering / Smart grid / Smart city / Computer security / Closed-circuit television / Risk / Surveillance / Internet privacy / Security / Public safety / National security

50 Years of Growth, Innovation and Leadership SAFER CITIES An Inevitable Trend in Urban Development A

Add to Reading List

Source URL: uk.nec.com

Language: English - Date: 2014-10-22 01:36:37
616Law / Privacy / Evaluation / Internet privacy / Systems engineering process / Environmental impact assessment / Ethics / Human rights / Identity management

An integrated privacy and ethical impact assessment David Wright Managing Partner Trilateral Research & Consulting at the PRESCIENT conference

Add to Reading List

Source URL: prescient-project.eu

Language: English - Date: 2012-12-03 10:52:47
617

Seminar: RFID B3: Security- und Privacy-Aspekte bei RFID ROMAN Consulting & Engineering AG

Add to Reading List

Source URL: www.roman.ch

Language: German - Date: 2006-11-07 15:25:02
    618Spamming / Graphical user interface elements / System software / Software / Alert dialog box / Website / Internet privacy / Transaction authentication number / Password / Social engineering / Computer crimes / Phishing

    Data Type Based Security Alert Dialogs Max-Emanuel Maurer Abstract [removed]

    Add to Reading List

    Source URL: www.medien.ifi.lmu.de

    Language: English - Date: 2011-05-18 05:13:13
    619Ian Kerr / Internet privacy / Information privacy / Legal aspects of computing / Anonymity / Personally identifiable information / Surveillance / Daniel J. Solove / Privacy / Ethics / Law

    contributors carlisle adams Carlisle Adams is a Full Professor in the School of Information Technology and Engineering (SITE) at the University of Ottawa. In both his private sector and his academic work, he has focused

    Add to Reading List

    Source URL: idtrail.org

    Language: English - Date: 2009-04-03 20:03:03
    620Internet privacy / Network architecture / Electronic engineering / Videotelephony / Digi International / Wireless sensor network / Virtual private network / DiGi Telecommunications / 3G / Computer network security / Technology / Computing

    Digi Wi-Point 3G Application Guide How to Create a VPN between Wi-Point 3G and WatchGuard ________________________________________________________________________ Scenario Digi Wi-Point 3G is used for remote site connect

    Add to Reading List

    Source URL: ftp1.digi.com

    Language: English - Date: 2009-05-14 14:21:05
    UPDATE