Cryptographic software

Results: 2705



#Item
361Disk encryption / Computer security / Internet privacy / Special purpose file systems / Email authentication / ESET / Filesystem-level encryption / Remote backup service / Email client / Computing / Cryptography / Cryptographic software

Case Study: Efficio ENJOY SAFER TECHNOLOGY Efficio Chooses ESET and DESlock to Secure Crucial Data

Add to Reading List

Source URL: download.deslock.com

Language: English - Date: 2015-03-27 11:06:33
362Internet standards / FTP clients / Internet protocols / FTP / Cryptographic protocols / FTPS / File Transfer Protocol / Secure Shell / Comparison of FTP client software / Computing / Internet / Network architecture

TurboFTP Your Ultimate File Transfer Tool TurboSoft develops secure file transfer client and server products which offer manageable, scalable, automated file transfer solution solution. Share information across the Inter

Add to Reading List

Source URL: www.tbsoftinc.com

Language: English - Date: 2009-08-07 00:06:13
363Electronics / Broadband / Voice over IP / Session border controller / Cryptographic software / Communication software / Comparison of VoIP software / Videotelephony / Computer-mediated communication / Electronic engineering

ABC SBC: Securing and Flexible Trunking FRAFOS GmbH 1. Introduction   Enterprises are increasingly replacing their PBXs with VoIP PBX or are extending their PXB

Add to Reading List

Source URL: www.frafos.com

Language: English - Date: 2015-05-19 07:36:39
364Disk encryption / Inode / Unix / Cryptographic software / HTTP cookie / Cross-site scripting / JavaScript / BitLocker Drive Encryption / Ln / Computing / Computer security / Software

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
365Data / Access control / Internet protocols / Identity management / Mobile content / Universal Plug and Play / Internet Key Exchange / IPsec / Smart card / Computing / Security / Cryptographic protocols

Inter-device Authentication and Authorization Framework: Demonstration System based on Novel Smart Card Software Manabu Hirano Department of Information and Computer Engineering Toyota National College of Technology 2-1

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2008-07-21 13:42:26
366Password / Cryptographic software / Authentication / LastPass Password Manager / Privileged password management / Security / Cryptography / Computer security

Nusoft Newsletter – IR Series No.29 Tech Overview : User Authentication Management Made Easy

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English
367Internet privacy / Network architecture / Cryptographic software / Transmission Control Protocol / Packet switching / Packet Processing / Internet Protocol / Anonymity / Degree of anonymity / Computing / Computer networking / Internet

LAP: Lightweight Anonymity and Privacy Hsu-Chun Hsiao† Tiffany Hyun-Jin Kim† Adrian Perrig† Akira Yamada‡ §

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-04-13 16:45:42
368Cryptography / Computer security / System software / Linux Unified Key Setup / Encryption / Pre-boot authentication / Array controller based encryption / FreeOTFE / Disk encryption / Cryptographic software / Software

Encryption at Rest Proven Encryption Solutions to Protect Your Noble Data An important first step in taking control of information and helping to meet regulatory requirements is encrypting your contact center’s sensiti

Add to Reading List

Source URL: www.noblesys.com

Language: English - Date: 2010-08-04 10:24:20
369Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2008-03-14 04:27:53
370Special purpose file systems / Public-key cryptography / Encrypting File System / Windows / Filesystem-level encryption / Security token / File system / Key management / Password / Cryptography / Cryptographic software / Disk encryption

Zero-Interaction Authentication Mark D. Corner Brian D. Noble

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:30
UPDATE