Your browser does not support JavaScript or it may be disabled!
 India As It Happens
Rediff Labs will showcase innovative products that rediff is working on behind the scenes.
News   |   Images
Get Realtime News
on your webpage

About 47 results for "ieee security privacy magazine"

Article: Is Bitcoin a Decentralized Currency?

Article: Is Bitcoin a Decentralized Currency?

This article first appeared in IEEE Security & Privacy magazine and is brought to you by InfoQ & IEEE Computer Society. Bitcoin has witnessed wider adoption and more attention than any other digital currency proposed to date. One reason for this ... InfoQ, 1 month ago

IEEE Announces The Future Of Identity ...

IEEE, the world's largest professional organization dedicated to advancing technology for humanity, today announced the acceptance of its Future of Identity Series at The South by Southwest® (SXSW®) Interactive Festival from March 13-17, 2015 in ...
 EFYTimes.com1 month ago SATURN 2015 Conference Opens Registration, Announces Keynotes  WorldNetDaily3 days ago

Diligent Board Member Services Wins Gold in Best in Biz Awards 2014

Overview Market News Market Videos Currencies International Treasury & Bonds Search InvestCenter Recent Quotes My Watchlist Indicators By: Diligent Board Member Services, Inc. via PR Newswire December 10, 2014 ...
 WorldNetDaily1 week ago
Low-Power Design

Next-Generation Design Issues in Communications

Design Articles If wireless devices are to communicate and interoperate autonomously, they first need to speak a common language. By Bruce Fette PhD, Chief Scientist, General Dynamics C4 Systems; Mieczyslaw M. Kokar, PhD, Northeastern University; ...
 Low-Power Design3 weeks ago
Sys-Con Italia

The 'Internet of Things' and Big Data | @ThingsExpo [#IoT]

By Lori MacVittie Article Rating: October 31, 2014 05:00 PM EDT Reads: 4,386 Cloud and Things and Big Operational Data Software-defined architectures are critical for achieving the right mix of efficiency and scale needed to meet ...
 Sys-Con Italia1 month ago

Data Hiding — A look at the Latest Techniques and Countermeasures

Presented by: Michael Raggo, Chet Hosmer Duration: Approximately 60 minutes. Cost: Free As malware grows in sophistication, current techniques reveal that malware variants are employing more covert functions. Additionally, corporate espionage ...
 O'Reilly Network1 month ago
Personalize your Realtimeclose [x]
Add content to your personalized tab - My News
Add upto 6 topics of your interest:
for eg.2g Scam , World
Personalize the tabs display. ( You can add or remove the tabs )
AlertsGet updates on latest news & your favourite topics right in your inbox.Set an Alert|Manage your Alerts


Realtime News

on your Webpage

Add Widget >Get your members hooked!
Get updated on latest news & your favorite topics right in your inbox!
More     Less