Printer Friendly

Browse Data security devices topic

Usage subtopic

Articles

1-38 out of 38 article(s)
Title Author Type Date Words
Touchless Authentication System Using Visual Fingertip Trajectories. Akman, Vefak Murat; Vural, Revna Acar; Koc, Kemal Talha Report Jul 14, 2020 6082
Development Status and Prospects of Graphical Password Authentication System in Korea. Yang, Gi-Chul Nov 1, 2019 6058
Image Encryption with The Cross Diffusion of Two Chaotic Maps. Jiao, Ge; Peng, Xiaojiang; Duan, Kaiwen Report Feb 1, 2019 5512
A Peer Pressure Method for Helping End-Users Generate Strong Passwords. Agholor, S.; Akinyemi, I. O. Oct 1, 2018 3677
Comparison between High- and Low-Cost Transmission of Tele-Anesthesia in Japan. Sugawara, Yoh; Miyashita, Tetsuya; Mizuno, Yusuke; Nagamine, Yusuke; Miyazaki, Tomoyuki; Kobayashi, Jan 1, 2018 3474
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing. Xuan, Shichang; Man, Dapeng; Zhang, Jiangchuan; Yang, Wu; Yu, Miao Jan 1, 2018 9198
Lightweight encryption design for embedded security. Anupama, G.; Iyappan, M.; Karpagam, M. Report Jun 15, 2016 2654
Biometric based multiserver authentication system. Devi, P. Keerthana; Chitra, T. Report Feb 1, 2016 1552
Gemalto demonstrates new uses for NFC. Mar 5, 2013 267
Gemalto demonstrates new uses for NFC. Mar 4, 2013 250
System to use one net password for multiple accounts draws renewed interest. Feb 26, 2010 237
Put the 'i' in IT compliance: a holistic, program-based approach can address security and privacy requirements. Linkous, John Dec 1, 2008 1215
Security role is evolving. Feb 1, 2008 295
ISF warning. Jan 1, 2008 431
Monitoring services to Japanese businesses in Asia. Brief article Jan 1, 2008 251
Data theft continues strong. Britt, Phillip Sep 1, 2007 1882
AirDefense enterprise security product chosen by Cardiff University. Brief article Jul 19, 2007 222
A site to see. Brief article Jul 1, 2007 163
Software market continues consolidation. Swartz, Nikki Brief article Nov 1, 2006 210
Preparing for encryption: new threats, legal requirements boost need for encrypted data. Moore, Fred Aug 1, 2005 1718
Differences between snapshots and continuous data protection. Rowan, Michael Aug 1, 2005 1354
NetSign Privacy Agent: security software to watch in 2004. Jun 1, 2004 703
Technology treats security symptoms. Dec 1, 2003 689
New security solution revealed by NetScreen. Brief Article Nov 11, 2003 82
What to expect from your IPS. Krull, Joseph E. Oct 1, 2003 392
Aventail Secures Backing of VA Vendors. Brief Article Sep 26, 2003 160
Blue Coat Systems' SG800 chosen by UK cancer charity. Brief Article Aug 5, 2003 103
Gartner Resets Firewall Market - No More Leaders. Brief Article Jun 23, 2003 136
KEYFOCUS LAUNCHES HONEYPOT-BASED INTRUSION DETECTION SYSTEM. Brief Article Jun 1, 2003 236
Port 53 monitoring. (Monitoring, detection products). Brief Article Jun 1, 2003 125
SSL-based remote access. (New Products & Services). Brief Article May 1, 2003 133
Vulnerability management technology: a powerful alternative to attack management for networks. (Storage Networking). Keanini, Tim May 1, 2003 3025
Whale ships security tool for SSL VPN sessions. Brief Article Mar 7, 2003 173
Intrusion prevention. (New Products). Brief Article Feb 1, 2003 117
Resellers nationwide tap SofaWare's security solutions to deploy comprehensive security services to small businesses. Jan 6, 2003 915
Security alert! If you've ever made these statements, you may be living in a techno-fool's paradise. Beckett, Dan Feb 1, 2002 439
Decoding encryption policy. Denning, Dorothy E.; Baugh, William E., Jr. Feb 1, 1996 3056
Social security numbers for animals? Brief Article Aug 13, 1994 188

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters