Cryptographic software

Results: 2705



#Item
191Cryptographic software / Email authentication / Email encryption / Encryption / Key disclosure law / Tor / Data security / Telecommunications data retention / Secure communication / Cryptography / Internet privacy / Public-key cryptography

Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

Add to Reading List

Source URL: hrp.law.harvard.edu

Language: English - Date: 2015-06-16 21:46:00
192PBKDF2 / Password manager / Password / Cryptographic software / Passphrase / Key management / Trusted Platform Module / Key stretching / Sticky Password Manager / Cryptography / Computer security / Security

“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
193Internet privacy / PGP / Pretty Good Privacy / Students for a Democratic Society / Internet / SDS-PAGE / Computing / Scientific Data Systems / Samsung SDS / Computer security / Cryptographic software / Email authentication

SDS E-Business Server™ Research report by Clabby Analytics October 2012 Clabby Analytics Research Report

Add to Reading List

Source URL: www.sdsusa.com

Language: English - Date: 2015-02-13 13:30:30
194USB / Public-key cryptography / Smart cards / Aloaha / PKCS / Encrypting File System / Cryptographic Service Provider / Microsoft CryptoAPI / Card reader / Cryptography / Microsoft Windows / Cryptographic software

Aloaha Smart Card Connector Native, plug & play security enhancement to Microsoft Windows Operation Systems and Applications

Add to Reading List

Source URL: www.aloaha.com

Language: English - Date: 2013-01-02 04:25:56
195HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
196Error detection and correction / Computer file formats / Search algorithms / Cryptographic hash functions / Hash list / Hash function / File system / File format / Windows Registry / Computing / Hashing / System software

SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz Greg Levin

Add to Reading List

Source URL: simhash.googlecode.com

Language: English - Date: 2007-12-13 05:28:46
197Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing

How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-09-01 09:06:37
198HTTP / HTTP Secure / Secure communication / Integrity / Plug-in / Technology / Computing / Cryptographic protocols / Software

GlassTube: A Lightweight Approach to Web Application Integrity Per A. Hallgren Daniel T. Mauritzson Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
199Bitcoin / Applied mathematics / Cryptographic nonce / Proof-of-work system / Consensus / Byzantine fault tolerance / Public-key cryptography / Cryptographic hash function / Cryptography / Computing / Software

Overview Bitcoin Problems with Bitcoin?

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-10-22 02:47:23
200Cryptography / Mac OS X / PGP / Email / GPGTools / Privacy of telecommunications / Keychain / Double-click / Apple Disk Image / Software / Cryptographic software / Computing

How to encrypt your form before sending it to us for processing (Mac OS X version) Step 1 – Allow installation of third party software One way is to check “Anywhere” under “System Preferences” -> “Security &

Add to Reading List

Source URL: cgi2013.welfenlab.de

Language: English - Date: 2014-08-14 09:32:51
UPDATE