Crypt

Results: 686



#Item
291Computer security / Cryptography / Password strength / Password / Crypt / Security

USENIX Association Proceedings of the 13th USENIX Security Symposium San Diego, CA, USA August 9–13, 2004

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2008-08-02 12:40:47
292SHA-2 / SHA-1 / MD4 / NIST hash function competition / MD5 / RIPEMD / Hash function / Secure Hash Standard / Crypt / Cryptographic hash functions / Error detection and correction / Cryptography

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
293Password / Cryptographic software / Crypt / Password cracking / Password policy / Security / Computer security / Cryptography

Problems with passwords Overview Most current password systems for the Internet are flawed. Designs that were almost acceptable 10 and 15 years ago have not been updated. Instead of moving to integrating authentication s

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:35
294Secure communication / Computing / Internet standards / Password / Transport Layer Security / HTTP Secure / Public-key cryptography / Crypt / Password manager / Cryptography / Security / Cryptographic protocols

securing your form • formstack.com • securing your form

Add to Reading List

Source URL: www.formstack.com

Language: English - Date: 2015-04-03 11:04:14
295Password / Two-factor authentication / Authentication / Crypt / Password manager / Password policy / Security / Cryptography / Computer security

ID and Passwords or PKI for your security ?

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:31
296Cryptographic software / Password / Disk encryption / Internet security / Google Chrome / Crypt / HTTP Secure / Software / Computing / Computer network security

Security Now! #[removed]Hacking Vehicles  This week on Security Now! ● ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-03-03 15:29:28
297Ritual / Columbarium / Cremation / Funeral / Crypt / Human behavior / Death customs / Culture / Cemetery

Australian Capital Territory

Add to Reading List

Source URL: www.legislation.act.gov.au

Language: English - Date: 2014-06-30 02:32:23
298Computer security / Crypt / Passphrase / Block cipher / Known-plaintext attack / Stream cipher / Password / Cyberwarfare / Encrypting File System / Cryptography / Cryptographic software / Cipher

Contents I Table of Contents Foreword

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:29
299Cryptography / Password / Crypt / Password manager / Password strength / Security / Computer security / Access control

How secure are password controlled self-decrypting files ?

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:33
300Assembly languages / Portable Executable / .NET assembly / Dynamic-link library / Password / Crypt / MOV / X86 architecture / High Level Assembly / Computing / System software / Software

AN INDEPTH LOOK INTO COMMERCIAL SOFTWARE

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:54
UPDATE