Cryptographic software

Results: 2705



#Item
321Data / Disk encryption / Data security / Cross-platform software / TrueCrypt / DBAN / Backup / Data recovery / Software / Computing / Cryptographic software

The Grad Toolkit Tips and Tricks for Success in Graduate School Gurdas Sandhu Dept. of Civil, Construction, and Environmental Engineering

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2014-06-29 21:17:11
322Cross-platform software / GNU Privacy Guard / PGP / Privacy software / X Window System / Server / Software / System software / Cryptographic software

Developing with Assuan VersionNovember 2014 by Werner Koch and Marcus Brinkmann {wk,mb}@g10code.com

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2014-12-11 07:17:52
323Jini / Cryptographic protocols / Internet protocols / Internet standards / Java remote method invocation / Transport Layer Security / Enterprise JavaBeans / Proxy server / Reverse proxy / Computing / Beta software / Java platform

Decentralized Jini Security Pasi Eronen and Pekka Nikander Helsinki University of Technology {pasi.eronen, pekka.nikander}@hut.fi Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:16:52
324Cryptography / Search algorithms / Database theory / Tamper-evident / Database security / Forensic science / Mass spectrometry software / Cryptographic hash function / Hash function / Science / Packaging / Security

D RAGOON: An Information Accountability System for High-Performance Databases Kyriacos E. Pavlou 1 and Richard T. Snodgrass 2 Department of Computer Science, The University of Arizona P.O. Box, Tucson, AZ 85721–

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2012-03-18 19:10:26
325Portable software / PuTTY / Bone grafting / Shape / Software / Communication software / Cryptographic software

NovaBone Putty Exceptional Handling Characteristics ®

Add to Reading List

Source URL: www.motdistributing.com

Language: English - Date: 2012-10-22 13:35:58
326Public-key cryptography / Key management / Safenet / Hardware security module / Symmetric-key algorithm / Key generation / Vormetric / Pretty Good Privacy / Cryptography / Disk encryption / Cryptographic software

SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2013-06-27 09:42:19
327Cryptographic software / Remote administration software / Portable software / Secure Shell / Telnet / PuTTY / Control key / TtyEmulator / Software / Computing / System software

SSH access to the DIMDI databases

Add to Reading List

Source URL: www.dimdi.de

Language: English - Date: 2015-05-20 03:55:44
328HTTP / Federated identity / CoSign single sign on / Computer network security / Internet privacy / Cryptographic protocols / Kerberos / Load balancing / Server / Software / Computing / System software

Setting Up Cosign Clients March 4, 2003 This presentation was originally given at an Academic Computing Support Forum (ACSF) meeting at the University of Michigan.

Add to Reading List

Source URL: weblogin.org

Language: English
329Software / Cryptographic software / Tor / Adversary model / Onion / Onion routing / Internet privacy / Horse racing / Computing

 Trust-­‐based  Anonymous  Communica4on:   Models  and  Rou4ng  Algorithms   Aaron  Johnson   U.S.  Naval  Research  Laboratory   Paul  Syverson   U.S.  Naval  Resea

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2011-11-02 11:33:27
330Portable software / FileZilla / Secure Shell / SSH File Transfer Protocol / Comparison of FTP client software / Comparison of SSH clients / Ssh-agent / OpenSSH / PuTTY / Software / Computing / Cryptographic software

MASTERCLASS FILEZILLA MASTERCLASS BEN EVERARD Essential Linux tools explained – this month, say hello

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:45
UPDATE