Secure Network Communications

Results: 121



#Item
101Data privacy / Privacy law / European Union / Computer law / Directive on Privacy and Electronic Communications / Network neutrality / Privacy / Electronic Commerce Directive / Universal Service Directive / European Union directives / Law / Ethics

Microsoft Word - EN[removed]original.doc

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2008-09-15 08:48:35
102Computing / Mobile computers / Telehealth / Wireless sensor network / ZigBee / Bluetooth / Communications protocol / ANT / MHealth / Technology / Wireless networking / Telecommunications engineering

Hide-n-Sense: Privacy-aware secure mHealth sensing Dartmouth Computer Science Technical Report TR2011-702 Shrirang Mare1 , Jacob Sorber1 , Minho Shin2 , Cory Cornelius1 , and David Kotz1 1 2

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-12-23 16:47:06
103Computer security / Secure communication / Crimeware / Malware / Verizon Communications / Attack / Data breach / Computer network security / Security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-06-15 20:00:00
104United States Department of Homeland Security / Computer network security / Computer security / Secure communication / Public safety / National Communications System / Critical infrastructure protection / Security / Crime prevention / National security

A Functional Model for Critical Infrastructure Information Sharing and Analysis Maturing and Expanding Efforts ISAC Council White Paper January 31, [removed]PURPOSE/OBJECTIVES

Add to Reading List

Source URL: www.isaccouncil.org

Language: English - Date: 2013-03-13 10:33:37
105Computer security / IPsec / FIPS 140-2 / FIPS 140 / Transmission Control Protocol / Security and safety features new to Windows Vista / Wireless security / Cryptography standards / Computing / Network architecture

Cryptek Secure Communications DiamondNIC & DiamondLink Security Policy Version 2.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
106National security / Public safety / Computer crimes / Computer security / Information security / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / Cloud computing / Network security / Security / Data security / Crime prevention

THE PRESIDENT’S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NSTAC Report to the President on Secure Government Communications

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-08-21 14:27:35
107Public health / Alert messaging / Emergency management / Iowa Communications Network / Health / Health Alert Network / Iowa

What is the HAN? The Iowa Health Alert Network (HAN) is a secure, web-based communication system allowing users to issue alerts, share documents, post announcements and news items, and collaborate. Iowa’s HAN was rolle

Add to Reading List

Source URL: www.idph.state.ia.us

Language: English - Date: 2009-06-19 16:03:47
108Technology / Secure Communications Interoperability Protocol / Fax / Integrated Services Digital Network / Secure voice / Command and Data modes / Secure Terminal Equipment / Secure communication / Electronic engineering / Security

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2012-08-31 08:48:18
109Industrial automation / Automation / Data security / EtherNet/IP / Firewall / Common Industrial Protocol / Deep packet inspection / Security appliance / SCADA / Technology / Computer network security / Industrial Ethernet

Belden Assists Schneider Electric to Secure Critical Industrial Automation Systems New ConneXium Tofino Firewall Protects EtherNet/IP Communications St. Louis, Missouri – January 28, 2014 – Belden Inc. (NYSE: BDC), a

Add to Reading List

Source URL: www.modbus.com

Language: English - Date: 2014-02-05 15:48:08
110Anonymous veto network / Dining cryptographers problem / Secure multi-party computation / RSA / Transmission Control Protocol / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

The Power of Anonymous Veto in Public Discussion Feng Hao1 and Piotr Zieli´ nski2, 1

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-10 14:54:54
UPDATE