Cryptographic software

Results: 2705



#Item
311Concurrent computing / Internet privacy / Cross-platform software / Cryptographic software / Distributed hash table / File sharing / Chord / Peer-to-peer / Anonymity / Software / Computing / Distributed data storage

Improving Sender Anonymity in a Structured Overlay with Imprecise Routing ? Giuseppe Ciaccio DISI, Universit` a di Genova via Dodecaneso 35, 16146 Genova, Italy

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2006-08-11 05:24:46
312Cryptographic software / Internet protocols / Internet standards / Secure Shell / OpenSSH / Telnet / Rlogin / File Transfer Protocol / SSH Communications Security / System software / Software / Computing

Risks of Unmanaged Encrypted Environments  to Critical National Infrastructures Tatu Ylönen Founder and CEO SSH Communications Security

Add to Reading List

Source URL: www.jnsa.org

Language: English - Date: 2014-02-04 01:44:37
313SCSI / Cryptographic software / Tape drive / Backup software / Computer hardware / Special purpose file systems / Disk encryption / Computing / Backup / Data security

Paranoia2 Tape Encryption Appliance Backup Media Encryption Product Overview The Paranoia2 is an in-line

Add to Reading List

Source URL: www.disuk.com

Language: English - Date: 2013-10-10 05:58:20
314Cryptographic software / Public-key cryptography / Encryption / Cryptography / ANts P2P / Database

577 Hitachi Review Vol), No. 9 Featured Articles

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-03-31 01:09:15
315Error detection and correction / Search algorithms / Data synchronization / Rsync / Cryptographic hash functions / Hashing / Transmission Control Protocol / Checksum / Sum / Computing / Data / System software

Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-02-07 00:17:36
316USB flash drive / Universal Serial Bus / USB mass-storage device class / Two-factor authentication / Encryption / Non-volatile memory / IronKey / Cryptographic software / USB flash drive security / Computer hardware / USB / Disk encryption

Investigating ‘secure’ USB sticksReport Investigating ‘secure’ USB sticks Classification PUBLIC

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:05
317Qualys / Internet / Network architecture / Electronic commerce / HTTP / Transport Layer Security / HTTP Secure / Application programming interface / Password / Computing / Cryptographic protocols / Secure communication

Qualys SSL Labs Terms of Use v2.2 ! By accessing, browsing or using this website, and/or downloading any of its software, content or information, you acknowledge that you have read, understand and agree to be bound by t

Add to Reading List

Source URL: dev.ssllabs.com

Language: English - Date: 2015-05-17 07:50:02
318Cryptography / System software / Password / Encryption software / Crypt / Encrypting File System / EncFS / Cryptographic software / Software / Disk encryption

PDF Document

Add to Reading List

Source URL: dwn.tensionsoftware.com

Language: English - Date: 2014-04-24 10:24:11
319Cloud storage / Internet security / Cryptographic software / Special purpose file systems / Computer security / System software / Encrypting File System / Comparison of online backup services / Computing / Backup / Data security

My Docs Online Security http://www.mydocsonline.com/security.html The My Docs Online development team is comprised of former Senior Principal Computer Scientists from a leading Internet security firm. Their primary secur

Add to Reading List

Source URL: www.mydocsonline.com

Language: English - Date: 2014-05-02 12:05:25
320Password / Salt / Crypt / Cryptographic software / Password strength / Password manager / Security / Cryptography / Computer security

PKC 2015 – March 31st Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:22:20
UPDATE