Public computer

Results: 14618



#Item
311Survey methodology / Questionnaire / Netbook / Computing / Computer-assisted web interviewing / Email / Mail / Bubble / Technology / Public opinion

The investigat r a www.iamillbe.stat.gouv.qc.c The preparations for the 2013 data collection are in full swing!

Add to Reading List

Source URL: www.iamillbe.stat.gouv.qc.ca

Language: English - Date: 2013-01-17 14:55:58
312Computing / Security / Mass surveillance / Technology / Privacy of telecommunications / Crime prevention / National security / Cybercrime / Telecommunications data retention / Legal aspects of computing / Computer security / Global surveillance disclosures

Before the Office of the United States Trade Representative Washington, DC In re Request for Public Comments To Compile the National Trade Estimate Report on Foreign

Add to Reading List

Source URL: www.ccianet.org

Language: English - Date: 2015-10-28 19:00:59
313Cryptography / Key management / Public key infrastructure / Reputation management / Identity management / Computer access control / Web of trust / Authentication / Trust / Public key certificate / Blockchain / Internet privacy

Rebranding the Web of Trust A White Paper from Rebooting the Web of Trust by Shannon Appelcline, Dave Crocker, Randall Farmer, and Justin Newton

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
314Software licenses / Computer law / Free software / Copyleft / Free and open-source software licenses / GNU General Public License / Multi-licensing / Shared source / Open-source license / Proprietary software / Mozilla Public License / Open-source software

11_Rosen_ch11 Page 255 Thursday, June 17, :06 AM 11 Shared Source, Eventual Source, and Other Licensing Models

Add to Reading List

Source URL: rosenlaw.com

Language: English - Date: 2012-03-14 20:08:08
315

In C.-M. Cheng et al., Eds., Public Key Cryptography − PKC 2016, Part I, volof Lecture Notes in Computer Science, pp, Springer, 2016. Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2016-02-23 20:14:59
    316Software licenses / Free software / Computer law / Open-source software / Free and open-source software / GNU General Public License / Free Software Foundation / Proprietary software / License compatibility / KDE / Shared source / Gratis versus libre

    The Small/Medium Enterprise guide to Open Source Software Carlo Daffara This guide (developed in the context of the FLOSSMETRICS and OpenTTT projects)

    Add to Reading List

    Source URL: smeguide.conecta.it

    Language: English - Date: 2011-09-09 10:16:50
    317Cryptography / Cryptography standards / Signature / Computer law / E-commerce / Regulation / Public key certificate / Electronic signature / Electronic Signatures Directive / Advanced electronic signature / Professional certification / European Union law

    LEN Official Journal of the European Communities

    Add to Reading List

    Source URL: www.a-sit.at

    Language: English - Date: 2005-09-27 11:15:24
    318Free and open-source software licenses / Copyleft / Computer law / GNU Project / GNU General Public License / Software license / License compatibility / Free Software Foundation / Free software license / Viral license

    Rosen_ch06 Page 103 Wednesday, June 23, 2004 9:59 AM 6 Reciprocity and the GPL The GPL Bargain

    Add to Reading List

    Source URL: rosenlaw.com

    Language: English - Date: 2012-03-14 20:07:57
    319Cryptography / Signature / Records management technology / Computer law / E-commerce / Key management / Electronic signature / Digital signature / Records management / Public key certificate / Authentication / Uniform Electronic Transactions Act

    ISSN035X THE UNITED REPUBLIC OF TANZANIA BILL SUPPLEMENT 20th February, 2015

    Add to Reading List

    Source URL: parliament.go.tz

    Language: English - Date: 2015-11-09 09:07:10
    320Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

    Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-05-17 22:04:37
    UPDATE