skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 1,062  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Fifth Amendment - Compelled Decryption - Supreme Court of New Jersey Holds that Compelled Disclosure of Defendant's iPhone Passcodes Does Not Violate the Self-Incrimination Clause
Material Type:
Article
Add to My Research

Fifth Amendment - Compelled Decryption - Supreme Court of New Jersey Holds that Compelled Disclosure of Defendant's iPhone Passcodes Does Not Violate the Self-Incrimination Clause

Harvard law review, 2021-04, Vol.134 (6), p.2267 [Peer Reviewed Journal]

COPYRIGHT 2021 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976X

Full text available

2
Appliquer un procédé argumentaire pour revendiquer une attribution des services en ergothérapie basée sur l’habilitation aux occupations
Material Type:
Article
Add to My Research

Appliquer un procédé argumentaire pour revendiquer une attribution des services en ergothérapie basée sur l’habilitation aux occupations

Canadian journal of bioethics = revue canadienne de bioéthique, 2020-07, Vol.3 (1), p.134-151 [Peer Reviewed Journal]

COPYRIGHT 2020 Universite de Montreal ;ISSN: 2561-4665 ;EISSN: 2561-4665 ;DOI: 10.7202/1070235ar

Full text available

3
Distinguishability of keystroke dynamic template
Material Type:
Article
Add to My Research

Distinguishability of keystroke dynamic template

PloS one, 2022-01, Vol.17 (1), p.e0261291-e0261291 [Peer Reviewed Journal]

COPYRIGHT 2022 Public Library of Science ;2022 Sae-Bae, Memon. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2022 Sae-Bae, Memon 2022 Sae-Bae, Memon ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0261291 ;PMID: 35061684

Full text available

4
Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards
Material Type:
Article
Add to My Research

Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards

PloS one, 2015-05, Vol.10 (5), p.e0126323-e0126323 [Peer Reviewed Journal]

COPYRIGHT 2015 Public Library of Science ;COPYRIGHT 2015 Public Library of Science ;2015 Lu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2015 Lu et al 2015 Lu et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0126323 ;PMID: 25978373

Full text available

5
An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
Material Type:
Article
Add to My Research

An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

PloS one, 2015-12, Vol.10 (12), p.e0145263-e0145263 [Peer Reviewed Journal]

COPYRIGHT 2015 Public Library of Science ;COPYRIGHT 2015 Public Library of Science ;2015 Moon et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2015 Moon et al 2015 Moon et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0145263 ;PMID: 26709702

Full text available

6
Cybersecurity Threats To Critical Infrastructure
Material Type:
Article
Add to My Research

Cybersecurity Threats To Critical Infrastructure

The Florida bar journal, 2023-05, Vol.97 (3), p.10

COPYRIGHT 2023 Florida Bar ;ISSN: 0015-3915 ;EISSN: 2163-596X

Full text available

7
Understanding the Bounds of the Computer Fraud and Abuse Act in the Wake of Van Buren
Material Type:
Article
Add to My Research

Understanding the Bounds of the Computer Fraud and Abuse Act in the Wake of Van Buren

The Florida bar journal, 2022-03, Vol.96 (2), p.22

COPYRIGHT 2022 Florida Bar ;ISSN: 0015-3915 ;EISSN: 2163-596X

Full text available

8
Developing a typology of network alteration strategies for implementation: a scoping review and iterative synthesis
Material Type:
Article
Add to My Research

Developing a typology of network alteration strategies for implementation: a scoping review and iterative synthesis

Implementation science : IS, 2023-04, Vol.18 (1), p.10-10, Article 10 [Peer Reviewed Journal]

2023. The Author(s). ;COPYRIGHT 2023 BioMed Central Ltd. ;2023. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2023 ;ISSN: 1748-5908 ;EISSN: 1748-5908 ;DOI: 10.1186/s13012-023-01266-3 ;PMID: 37024916

Full text available

9
Prioritizing security over usability: Strategies for how people choose passwords
Material Type:
Article
Add to My Research

Prioritizing security over usability: Strategies for how people choose passwords

Journal of cybersecurity (Oxford), 2021-01, Vol.7 (1) [Peer Reviewed Journal]

The Author(s) 2021. Published by Oxford University Press. 2021 ;ISSN: 2057-2085 ;EISSN: 2057-2093 ;DOI: 10.1093/cybsec/tyab012

Full text available

10
How the Supreme Court's Decision in Van Buren Impacts Mobile Employees and Computer Data Theft in Florida
Material Type:
Article
Add to My Research

How the Supreme Court's Decision in Van Buren Impacts Mobile Employees and Computer Data Theft in Florida

The Florida bar journal, 2022-03, Vol.96 (2), p.30

COPYRIGHT 2022 Florida Bar ;ISSN: 0015-3915 ;EISSN: 2163-596X

Full text available

11
The Generative Internet
Material Type:
Article
Add to My Research

The Generative Internet

Harvard law review, 2006-05, Vol.119 (7), p.1974-2040 [Peer Reviewed Journal]

Copyright 2006 The Harvard Law Review Association ;COPYRIGHT 2006 Harvard Law Review Association ;COPYRIGHT 2006 Harvard Law Review Association ;Copyright Harvard Law Review Association May 2006 ;ISSN: 0017-811X ;EISSN: 2161-976X ;CODEN: HALRAF

Full text available

12
Decriminalizing Trivial Computer Use: The Need to Narrow the Computer Fraud and Abuse Act (CFAA) After Van Buren
Material Type:
Article
Add to My Research

Decriminalizing Trivial Computer Use: The Need to Narrow the Computer Fraud and Abuse Act (CFAA) After Van Buren

Federal communications law journal, 2024-01, Vol.76 (2), p.239-268 [Peer Reviewed Journal]

COPYRIGHT 2024 The George Washington University Law School ;Copyright George Washington University, National Law Center Jan 2024 ;ISSN: 0163-7606 ;EISSN: 2376-4457

Full text available

13
A digital memories based user authentication scheme with privacy preservation
Material Type:
Article
Add to My Research

A digital memories based user authentication scheme with privacy preservation

PloS one, 2017-11, Vol.12 (11), p.e0186925-e0186925 [Peer Reviewed Journal]

COPYRIGHT 2017 Public Library of Science ;COPYRIGHT 2017 Public Library of Science ;2017 Liu et al 2017 Liu et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0186925 ;PMID: 29190659

Full text available

14
Criminal law - Computer Fraud and Abuse Act - Ninth Circuit affirms conviction of a former employee who used another employee's password
Material Type:
Article
Add to My Research

Criminal law - Computer Fraud and Abuse Act - Ninth Circuit affirms conviction of a former employee who used another employee's password

Harvard law review, 2017-02, Vol.130 (4), p.1265 [Peer Reviewed Journal]

COPYRIGHT 2017 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976X

Full text available

15
CRIMINAL PROCEDURE - FORENSIC SEARCHES OF DIGITAL INFORMATION AT THE BORDER - ELEVENTH CIRCUIT HOLDS THAT BORDER SEARCHES OF PROPERTY REQUIRE NO SUSPICION
Material Type:
Article
Add to My Research

CRIMINAL PROCEDURE - FORENSIC SEARCHES OF DIGITAL INFORMATION AT THE BORDER - ELEVENTH CIRCUIT HOLDS THAT BORDER SEARCHES OF PROPERTY REQUIRE NO SUSPICION

Harvard law review, 2019-01, Vol.132 (3), p.1112 [Peer Reviewed Journal]

COPYRIGHT 2019 Harvard Law Review Association ;COPYRIGHT 2019 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976X

Full text available

16
Personality and Cognitive Factors in Password Security Behaviors
Material Type:
Article
Add to My Research

Personality and Cognitive Factors in Password Security Behaviors

North American journal of psychology, 2023-09, Vol.25 (3), p.599-618 [Peer Reviewed Journal]

COPYRIGHT 2023 North American Journal of Psychology ;Copyright North American Journal of Psychology Sep 2023 ;ISSN: 1527-7143

Full text available

17
Performance measures for evaluating the dynamic authentication techniques
Material Type:
Article
Add to My Research

Performance measures for evaluating the dynamic authentication techniques

International journal of cyber-security and digital forensics, 2016-04, p.30

COPYRIGHT 2016 The Society of Digital Information and Wireless Communications ;ISSN: 2305-0012 ;EISSN: 2305-0012

Full text available

18
The "New Abnormal"--The Emergence of Persistently Insecure Digital Systems
Material Type:
Article
Add to My Research

The "New Abnormal"--The Emergence of Persistently Insecure Digital Systems

The Business lawyer, 2021-12, Vol.77 (1), p.263 [Peer Reviewed Journal]

COPYRIGHT 2021 American Bar Association ;ISSN: 0007-6899 ;EISSN: 2164-1838

Full text available

19
Balancing Password Security and User Convenience: Exploring the Potential of Prompt Models for Password Generation
Material Type:
Article
Add to My Research

Balancing Password Security and User Convenience: Exploring the Potential of Prompt Models for Password Generation

Electronics (Basel), 2023-05, Vol.12 (10), p.2159 [Peer Reviewed Journal]

COPYRIGHT 2023 MDPI AG ;2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2079-9292 ;EISSN: 2079-9292 ;DOI: 10.3390/electronics12102159

Full text available

20
Constitutional law - Fourth Amendment - Ninth Circuit holds forensic search of laptop seized at border requires showing of reasonable suspicion
Material Type:
Article
Add to My Research

Constitutional law - Fourth Amendment - Ninth Circuit holds forensic search of laptop seized at border requires showing of reasonable suspicion

Harvard law review, 2014-01, Vol.127 (3), p.1041 [Peer Reviewed Journal]

COPYRIGHT 2014 Harvard Law Review Association ;COPYRIGHT 2014 Harvard Law Review Association ;ISSN: 0017-811X ;EISSN: 2161-976X

Full text available

Results 1 - 20 of 1,062  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (52)

Refine My Results

Creation Date 

From To
  1. Before 1993  (43)
  2. 1993 To 1999  (96)
  3. 2000 To 2006  (235)
  4. 2007 To 2014  (604)
  5. After 2014  (85)
  6. More options open sub menu

Language 

  1. English  (1,058)
  2. French  (5)
  3. More options open sub menu

Searching Remote Databases, Please Wait