Implementing an Information Security Program
Protecting Donor Privacy
Vormetric data security complying with pci dss encryption rules
Cofidential data storage and deletion 2003 (2)
Cryptographysecurity 1222867498937700-9
Understanding OAuth 2.0
A security method for multiple attacks in sensor networks against the false report injection attack and the sinkhole attack
Digital signature
RFP Appendix L
Computational Complexity Jennifer Chubb George Washington University April 10, 2007.
Transmitter for Quantum Encryption System
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.