Secure Digital

Results: 1590



#Item
111Economy of Japan / Business / Economy / Fuyo Group / Ricoh / Binoculars / Image stabilization / Pentax / Secure Digital

...vision...far beyond imagination. Digital Binoculars RICOH Enhanced Binoculars

Add to Reading List

Source URL: industry.ricoh.com

Language: English - Date: 2015-07-06 21:23:22
112Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:33:21
113

Secure Digital Input/Output (SDIO) Host Controller Data Sheet •••••• Proven System Block (PSB) for QuickLogic® Customer Specific Standard Products (CSSPs)

Add to Reading List

Source URL: www.quicklogic.com

Language: English - Date: 2014-04-10 21:52:56
    114Privacy law / Information privacy / Computing / Privacy / Digital rights / Human rights / Government / European Data Protection Supervisor / General Data Protection Regulation / Personally identifiable information / Internet privacy / Right to privacy

    OpinionTowards a new digital ethics Data, dignity and technology 11 September 2015

    Add to Reading List

    Source URL: secure.edps.europa.eu

    Language: English - Date: 2015-09-11 08:48:50
    115Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

    Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

    Add to Reading List

    Source URL: people.redhat.com

    Language: English - Date: 2015-09-02 09:27:18
    116

    Threat Protection Address State-of-the-Art Attacks We are at the center of the discussion in the embedded systems security domain. DIGITAL TRUST

    Add to Reading List

    Source URL: secure-ic.com

    Language: English - Date: 2013-09-09 01:11:14
      117Micronas / Elliptic curve cryptography / Cryptography / Hardware security module / High-bandwidth Digital Content Protection / BlackBerry Limited / Key management / Key

      Micronas Secures Production with Certicom KeyInject ® Micronas needed a secure system for transporting and embedding keys into silicon chips for use in consumer electronics. Certicom

      Add to Reading List

      Source URL: www.certicom.com

      Language: English - Date: 2008-11-09 16:17:51
      118Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

      Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:32:58
      119Microcontrollers / ARM architecture / Embedded microprocessors / STM32 / Secure Digital / USB / Serial Peripheral Interface Bus / Datasheet / Phase-locked loop / Flash memory / IC / NXP LPC

      STM32F401xD STM32F401xE ARM® Cortex®-M4 32b MCU+FPU, 105 DMIPS, 512KB Flash/96KB RAM, 11 TIMs, 1 ADC, 11 comm. interfaces Datasheet - production data Features

      Add to Reading List

      Source URL: www.espruino.com

      Language: English - Date: 2015-05-14 11:58:14
      120

      Competition Rebooted: Enforcement and personal data in digital markets Keynote speech at Joint ERA-EDPS seminar Brussels 24 September 2015 Giovanni Buttarelli I’m delighted to be opening this seminar, jointly hosted b

      Add to Reading List

      Source URL: secure.edps.europa.eu

      Language: English - Date: 2015-10-01 04:39:57
        UPDATE