Works matching DE "WORLD Wide Web -- Security measures"
Results: 20
Computer firewalls: security and privacy protection for Mac--review.
- Published in:
- Big Data & Information Analytics, 2021, v. 6, n. 1, p. 1, doi. 10.3934/bdia.2021001
- By:
- Publication type:
- Article
VeriSign Plans $100 Million Upgrade.
- Published in:
- IT Professional, 2007, v. 9, n. 2, p. 4
- Publication type:
- Article
On_the_Net@cma.ca.
- Published in:
- Canadian Medical Association Journal (CMAJ), 1997, v. 157, n. 5, p. 574
- By:
- Publication type:
- Article
Who goes there? Staying Anonymous on the Internet.
- Published in:
- TechTrends: Linking Research & Practice to Improve Learning, 2009, v. 53, n. 1, p. 7, doi. 10.1007/s11528-009-0226-5
- By:
- Publication type:
- Article
SERVICE LICENSING COMPOSITION AND COMPATIBILITY ANALYSIS.
- Published in:
- International Journal of Cooperative Information Systems, 2008, v. 17, n. 3, p. 301, doi. 10.1142/S0218843008001841
- By:
- Publication type:
- Article
User Identity for WebRTC Services: A Matter of Trust.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 18, doi. 10.1109/MIC.2014.128
- By:
- Publication type:
- Article
Real-Time Communications Security on the Web.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 8, doi. 10.1109/MIC.2014.117
- By:
- Publication type:
- Article
The Fridge's Brain Sure Ain't the Icebox.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 81, doi. 10.1109/MIC.2014.122
- By:
- Publication type:
- Article
Transport Layer Security.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 60, doi. 10.1109/MIC.2014.126
- By:
- Publication type:
- Article
Front Cover.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. c1, doi. 10.1109/MIC.2014.113
- Publication type:
- Article
Browser-to-Browser Security Assurances for WebRTC.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 11, doi. 10.1109/MIC.2014.106
- By:
- Publication type:
- Article
Who Is Calling Which Page on the Web?
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 26, doi. 10.1109/MIC.2014.105
- By:
- Publication type:
- Article
Issues & Vulnerabilities Related to Online Voting and Its Mitigation.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1954
- By:
- Publication type:
- Article
Rule-based verification of Web sites.
- Published in:
- International Journal on Software Tools for Technology Transfer, 2006, v. 8, n. 6, p. 565, doi. 10.1007/s10009-006-0009-7
- By:
- Publication type:
- Article
Protecting the Internet Without Wrecking It: The best solutions don't assume a zero-sum tradeoff between security and generativity.'
- Published in:
- Boston Review, 2008, v. 33, n. 2, p. 21
- By:
- Publication type:
- Article
Protecting the Internet Without Wrecking It: We need to develop a socially embedded online experience.
- Published in:
- Boston Review, 2008, v. 33, n. 2, p. 18
- By:
- Publication type:
- Article
Protecting the Internet Without Wrecking It: In the eyes of many existing institutions, security isn't a problem—it's an opportunity.
- Published in:
- Boston Review, 2008, v. 33, n. 2, p. 17
- By:
- Publication type:
- Article
The Customer Economics of Internet Privacy.
- Published in:
- Journal of the Academy of Marketing Science, 2002, v. 30, n. 4, p. 455, doi. 10.1177/009207002236917
- By:
- Publication type:
- Article
Bad Neighborhoods.
- Published in:
- Strategic Finance, 2007, v. 88, n. 11, p. 55
- By:
- Publication type:
- Article
Rule-Based Security Capabilities Matching for Web Services.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 4, p. 1349, doi. 10.1007/s11277-013-1254-1
- By:
- Publication type:
- Article