Crypto

Results: 1625



#Item
731

III. Mody činnosti blokových šifer a hašovací funkce Vlastimil Klíma

Add to Reading List

Source URL: crypto-world.info

Language: Czech - Date: 2008-06-15 08:31:28
    732Computing / Internet / Human rights / Anonymity / Internet ethics / Pseudonymity / Privacy / Tor / Crypto-anarchism / Ethics / Internet privacy / Computer law

    1    Anonymity and Encryption   Comments submitted to the United Nations Special Rapporteur on  the Promotion and Protection of the Right to Freedom of Opinion 

    Add to Reading List

    Source URL: www.ohchr.org

    Language: English - Date: 2015-06-02 08:49:14
    733French Resistance / Maquis des Vosges / Michelle de Bonneuil

    Brèves 2015 S15 à S19 – La mare du Gof Actus Sécurité Grand public => CRYPVAULT: New Crypto-ransomware Encrypts and “Quarantines” Files. «We uncovered a new crypto-ransomware variant with new rout

    Add to Reading List

    Source URL: lamaredugof.fr

    Language: English - Date: 2015-05-10 14:04:27
    734

    Crypto Contest Step One: You and your partner(s) will make an encryption algorithm of your own creation. You want to incorporate the tools we’ve discussed in class so far and probably to build upon them in some way. O

    Add to Reading List

    Source URL: betweenthenumbers.files.wordpress.com

    - Date: 2015-04-04 21:45:27
      735FIPS 140-2 / FIPS 140 / Cryptographic software / Data Encryption Standard / Zeroisation / Internet Key Exchange / Key Wrap / AES implementations / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

      Microsoft Word - 206k - µMACE_Security_Policy R010706 - MotApprovaed.doc

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-05-22 07:39:47
      736Computing / Crypto-anarchism / Virtual private network / Cyberwarfare / Computer architecture / Tunneling protocols / Computer network security / Network architecture / Internet privacy

      Guidelines for renewal of VPN account 1. VPN team is mailing prefilled VPN application as per existing information available and sending the auto generated pdf to the user with copy to the respective NIC coordinator atl

      Add to Reading List

      Source URL: vpn.nic.in

      Language: English - Date: 2015-02-06 04:34:51
      737Computing / Computer architecture / Cyberwarfare / Crypto-anarchism / Virtual private networks / UT-VPN / Mobile virtual private network / Computer network security / Internet privacy / Network architecture

      VPN REMOTE ACCESS SECURITY USER FORM Please check the box below that represents your security request: VPN: If checked, please complete the VPN Section below.

      Add to Reading List

      Source URL: www.doit.state.nm.us

      Language: English - Date: 2012-11-05 16:21:48
      738Computing / Crypto-anarchism / Virtual private network / Gemalto / Computer security / Cyberwarfare / Computer network security / Internet privacy / Network architecture

      Name of the Document Classification General Version 1.0

      Add to Reading List

      Source URL: vpn.nic.in

      Language: English - Date: 2013-05-22 06:30:04
      739Computer security / Cyberwarfare / Internet privacy / Network architecture / Crypto-anarchism / Virtual private network / Cisco Systems VPN Client / UT-VPN / Computer network security / Tunneling protocols / Computing

      Name of the Document Classification Restricted Version 4.0

      Add to Reading List

      Source URL: vpn.nic.in

      Language: English - Date: 2015-01-23 04:09:46
      740

      MFF UK Praha, 22. duben 2008 Elektronický podpis / CA / PKI – část 2 http://crypto-world.info/mff/mff_03.pdf P.Vondruška

      Add to Reading List

      Source URL: www.karlin.mff.cuni.cz

      Language: Czech
        UPDATE