Search

Your search keyword '"DATA encryption"' showing total 18 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Region united states Remove constraint Region: united states
18 results on '"DATA encryption"'

Search Results

1. Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism.

2. Perspective of United States Judo Coaches on Concussion: A National Survey.

3. CRACKS IN THE ARMOR: LEGAL APPROACHES TO ENCRYPTION.

4. Abortion Providers and Patients Under Threat of Privacy Breaches.

5. Apple: Good Business, Poor Citizen?

6. A Secure and Scalable Data Communication Scheme in Smart Grids.

7. THE FIGHT OVER ENCRYPTION: REASONS WHY CONGRESS MUST BLOCK THE GOVERNMENT FROM COMPELLING TECHNOLOGY COMPANIES TO CREATE BACKDOORS INTO THEIR DEVICES.

8. CODE SPEAK: CONSTITUTIONAL AVOIDANCE ON THE FIRST AMENDMENT ENCRYPTION QUESTION.

10. A Mystery Wrapped in an Encryption: Surveillance and Privacy in the Encrypted Era.

11. Game of Phones, Data Isn't Coming: Modern Mobile Operating System Encryption and Its Chilling Effect on Law Enforcement.

12. Crypto Wars II.

13. HIPAA Compliance with Mobile Devices Among ACGME Programs.

14. Development of a cloud-based application for the Fracture Liaison Service model of care.

15. Furtive Encryption: Power, Trust, and the Constitutional Cost of Collective Surveillance.

16. COVER YOUR WEBCAM: UNENCRYPTING LAURA POITRAS'S CITIZENFOUR.

17. MEGA, DIGITAL STORAGE LOCKERS, AND THE DMCA: WILL INNOVATION BE STIFLED BY FEARS OF PIRACY?

18. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask.

Catalog

Books, media, physical & digital resources