Security University

Results: 12075



#Item
431Digital rights / Human rights / Identity management / Law / Privacy / Internet privacy / Data security / Information privacy / Medical privacy / Politics / Government

Engendering Trust: Privacy Policies and Signatures Joshua B. Gross, Jessica Sheffield, Alice Anderson, and Nan Yu The Pennsylvania State University University Park, PA 16802 , (jessicas, aea145, nxy906

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-01 23:42:33
432Privacy / Identity documents / Identity management / Data security / Law / Personally identifiable information / Internet privacy / Information privacy / REAL ID Act / Anonymity / Medical privacy / Pseudonym

Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-19 11:28:28
433Cryptography / Permutations / Combinatorics / Trapdoor function / NC / RSA / Optimal asymmetric encryption padding / Permutation / Parity of a permutation / Factorial / Integer factorization

Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2014-11-18 10:03:56
434Violence / Crime / Academia / Sexual abuse / Rape / Sex crimes / Universities and colleges / Criminology / Clery Act / Murder of Jeanne Clery / Campus sexual assault / Victimology

Texas A&M University‐San AntonioAnnual Security and Fire Safety Report Jeanne Clery Disclosure of Campus Security Policy And Campus Crime Statistics Act

Add to Reading List

Source URL: www.tamusa.edu

Language: English - Date: 2015-09-24 17:33:22
435The Work Number / Immigration to the United States / Security / Check verification service / Identity management / Systematic Alien Verification for Entitlements

Verification of Employment and Income The University of California, Irvine uses The Work Number® to complete verifications of employment and income. The Work Number® is an automated service that will allow you to recei

Add to Reading List

Source URL: www.accounting.uci.edu

Language: English - Date: 2016-05-18 19:48:15
436Finance / Economy / Stock market / Money / Security / CUSIP / International Securities Identification Number

200 University Ave., Suite 300 Toronto, Ontario M5H 4H1 TFVIA ELECTRONIC TRANSMISSION July 6, 2015

Add to Reading List

Source URL: www.xylabrands.com

Language: English - Date: 2015-11-17 13:16:03
437Cyberwarfare / Computer security / Cybercrime / Malware / Rootkits / Cryptography / CrySyS Lab / Duqu / Stuxnet / Flame / Wiper / Ambient intelligence

Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

Add to Reading List

Source URL: www.crysys.hu

Language: English - Date: 2016-07-26 04:36:44
438Software / Computer access control / Password / Security / Prevention / ANI / Cursor / Icon / Point and click / Draw a Secret / Pointer

A Random Cursor Matrix to Hide Graphical Password Input Alice Boit Thomas Geimer Hochschule Bremen (University of Applied Sciences) J¨orn Loviscach∗

Add to Reading List

Source URL: www.j3l7h.de

Language: English - Date: 2009-08-23 13:49:42
439Computer access control / Cryptography / Computer security / Security / Access control / Usability / Authentication / Notary / Packaging / Implicit authentication / Password

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:58
440Government / Bahraini law / Constitution of Bahrain / Interagency Security Classification Appeals Panel

A.B. 17 Abolition of the Bylaws of Student Government and Appropriate Incorporation of Articles into Other Governing Documents center3111400 IN THE UNIVERSITY OF TEXAS AT AUSTIN STUDENT GOVERNMENT

Add to Reading List

Source URL: gallery.mailchimp.com

Language: English - Date: 2013-10-21 23:31:17
UPDATE