Cryptographic software

Results: 2705



#Item
211Security / Email authentication / Cryptographic software / Secure communication / Clipper chip / Disk encryption / National Security Agency / Pretty Good Privacy / Email encryption / Cryptography / Internet privacy / Computer security

Bankston_short_biographical_summary

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-05-04 13:25:41
212PHP programming language / Password / Crypt / PhpMyAdmin / Cryptographic software / Software / Cross-platform software / MySQL

Computer Science 75 Fall 2009 Scribe Notes Lecture 6: October 26, 2009 Andrew Sellergren

Add to Reading List

Source URL: cdn.cs75.net

Language: English - Date: 2012-08-23 00:55:02
213Internet / Cryptographic software / Transmission Control Protocol / Packet switching / Internet Protocol / Packet Processing / Anonymity / Degree of anonymity / Tor / Computer networking / Computing / Internet privacy

LAP: Lightweight Anonymity and Privacy

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:35:47
214Internet / Software / Cryptographic software / Tor / Block / IP blocking / Emirates Integrated Telecommunications Company / IP address / Internet privacy / Computer network security / Computing

Anonymity and Censorship Resistance Entry node Middle node Exit node

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-11-04 07:24:41
215Cryptography / Computing / Bitcoin / Peer-to-peer computing / Business / Electronic commerce / Cryptographic nonce / Electronic money / Peer-to-peer / Payment systems / Software / Financial cryptography

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame NEC Laboratories EuropeHeidelberg, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-03 04:11:29
216Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

Add to Reading List

Source URL: karlodwyer.github.io

Language: English - Date: 2014-06-25 06:07:20
217Cryptographic software / Computer security / Computing / Privacy software / Cross-platform software / GNU Privacy Guard / ISO/IEC / Answer to reset / Communications protocol / Smart cards / Cryptography / PGP

Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems

Add to Reading List

Source URL: www.g10code.de

Language: English - Date: 2011-11-04 13:30:01
218Cryptographic hash functions / Hashing / Advanced Encryption Standard / Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Open Source Software Institute / SHA-2 / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2007-12-13 15:11:03
219Theoretical computer science / Process calculi / Π-calculus / Communications protocol / Ping / Computing / System software / Data

¨ BRICS RSHuttel & Srba: Recursion vs. Replication in Simple Cryptographic Protocols BRICS

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2004-12-08 05:15:15
220Computing / Internet protocols / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / HTTP Secure / Public-key cryptography / Secure communication / Cryptographic protocols / Cryptography

TLS/SSL Securing your traffic 25 Security Workshop Fakrul Alam

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-01-07 14:15:34
UPDATE