Cryptographic software

Results: 2705



#Item
431Security / Cryptographic software / Software / Human rights / Tor / Electronic commerce / Privacy / Computer security / Password / Proxy servers / Ethics / Internet privacy

Mix Operator's Agreement

Add to Reading List

Source URL: anon.inf.tu-dresden.de

Language: English - Date: 2004-03-04 05:41:54
432Password / Cryptographic software / Cryptography / Crypt / Password policy / KeePass / Software / Security / Computer security

Password Protection APPENDIX B PASSWORD PROTECTION The payroll system provides password protection as a standard feature. If you do not wish to implement a password, you may change one or both passwords to blanks. This

Add to Reading List

Source URL: www.datasmithpayroll.com

Language: English - Date: 2008-09-16 20:41:59
433Trusted computing / Disk encryption / Cryptography / Trusted Platform Module / Trusted Computing Group / Cryptographic software / Trusted Execution Technology / BitLocker Drive Encryption / BIOS / Computer security / System software / Software

OSLO: Improving the security of Trusted Computing Bernhard Kauer Technische Universität Dresden Department of Computer ScienceDresden, Germany

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2007-05-22 08:46:36
434Crime prevention / National security / Computer network security / Software testing / Formal sciences / Side channel attack / Fault injection / Cryptography / Cryptographic engineering / Security / Cyberwarfare / Computer security

“I only write numbers in base 10.” Pablo Rauzy Information Security PhD student Open Access advocate

Add to Reading List

Source URL: pablo.rauzy.name

Language: English - Date: 2015-03-28 18:02:06
435Internet protocols / Cryptographic protocols / Cryptographic software / PKI Resource Query Protocol / Cryptography / Public-key cryptography / Key management

Specification Problem around Multi PKI domain

Add to Reading List

Source URL: www.jnsa.org

Language: English - Date: 2006-11-05 21:38:35
436Graphics file formats / Steganalysis / Cryptographic software / Jessica Fridrich / JPEG / Grayscale / Bitmap / BPCS-Steganography / Cryptography / Espionage / Steganography

LNCSImproved Detection of LSB Steganography in Grayscale Images

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2007-06-19 07:10:55
437Cryptographic software / Software / Privacy software / Cross-platform software / OpenPGP card / GNU Privacy Guard / Security token / Pretty Good Privacy / GPGTools / PGP / Cryptography / Computer security

Gnuk — An OpenPGP USB Token Implementation Niibe Yutaka <> About Me Contributor to GNU Project

Add to Reading List

Source URL: www.gniibe.org

Language: English - Date: 2014-05-21 01:03:40
438Software / Human rights / Tor / Anonymity / System software / Privacy / Internet privacy / Ethics / Cryptographic software

Current events in Tor development. Roger Dingledine The Tor Project https://torproject.org/ 1

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2007-12-29 19:21:51
439Software / Cryptographic software / Tor / Load / Covert channel / Server / CPU time / Internet privacy / Computing / System software

Covert channels and anonymity Steven J. Murdoch Computer Laboratory Security Group

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
440Cryptographic protocols / Secret sharing / Dropbox / Cloud computing / Computing / Software

PDF Document

Add to Reading List

Source URL: www.buildingtrustincloud.org

Language: English - Date: 2014-10-09 07:27:13
UPDATE