Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Committee on Authentication Technologies and Their Privacy Implications"'
Autor:
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Authentication Technologies and Their Privacy Implications, Lynette I. Millett, Stephen T. Kent
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubi
Autor:
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Authentication Technologies and Their Privacy Implications, Lynette I. Millett, Stephen T. Kent
IDs—Not That Easy highlights some of the challenging policy, procedural, and technological issues presented by nationwide identity systems. In the wake of the events of September 11, 2001, nationwide identity systems have been proposed to better tr
Autor:
Regan, Priscilla1 pregan@gmu.edu
Publikováno v:
Society. Aug2017, Vol. 54 Issue 4, p363-366. 4p.
Publikováno v:
IEEE Internet Computing; Nov/Dec2003, Vol. 7 Issue 6, p54, 5p
Autor:
O'Neil, PatrickH.1 (AUTHOR) poneil@ups.edu
Publikováno v:
Studies in Conflict & Terrorism. Nov/Dec2005, Vol. 28 Issue 6, p547-566. 20p. 1 Graph.
Publikováno v:
SciTech Book News. Jun2003, Vol. 27 Issue 2, p176-193. 18p.
Autor:
Dasgupta, Dipankar, Ferebee, Denise, Saha, Sanjib, Nag, Abhijit Kumar, Subedi, Kul Prasad, Madero, Alvaro, Sanchez, Abel, Williams, John
Publikováno v:
2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS); 2014, p1-10, 10p
Autor:
Ben Ayed, Ghazi
Publikováno v:
Architecting User-Centric Privacy-as-a-Set-of-Services; 2014, p11-55, 45p
Autor:
Dasgupta, Dipankar, Saha, Sudip
Publikováno v:
ACM International Conference Proceeding Series; Apr2009, p1-4, 4p
Autor:
Williams, John Michael
Publikováno v:
Proceedings of the 2002 Workshop: New Security Paradigms; 9/23/2002, p97-107, 11p