Cryptographic software

Results: 2705



#Item
531Software / Encryption software / Computing / Encryption / Windows Explorer / Security and safety features new to Windows Vista / Cryptographic software / System software / Disk encryption

Microsoft Word - GoldKey PIV Manual-7.12B.docx

Add to Reading List

Source URL: www.goldkey.com

Language: English - Date: 2014-06-26 17:26:46
532Computing / Software / System software / Proxy servers / Tor / File sharing networks / Network congestion / Throughput / Peer-to-peer / Internet privacy / Network performance / Cryptographic software

How Low Can You Go: Balancing Performance with Anonymity in Tor John Geddes1 , Rob Jansen2 , and Nicholas Hopper1 1 University of Minnesota, Minneapolis, MN

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2013-05-06 18:02:20
533Login / Internet / Access control / Personal development / Cryptographic software / Password / Email / Computing

MyCPD User Guide MyCPD is an online system that does away with paper CPD application forms, saving you and the staff at ISNSW valuable time. Once you have attended an event you can use MyCPD to indicate your attendance,

Add to Reading List

Source URL: www.surveyors.org.au

Language: English - Date: 2015-04-16 23:05:47
534Cryptographic software / Data security / Password / Backup / KeePass / Data loss / Password cracking / OTPW / Security / Software / Computer security

StormView Times October 2014 StormView Times “Insider Tips To Make Your Business Run Faster, Easier And More Profitably”

Add to Reading List

Source URL: www.stormsedge.com

Language: English - Date: 2015-01-06 10:01:04
535Computer security / MD5 / Cryptographic hash functions / Search algorithms / Archive formats / Crypt / GNU Privacy Guard / Zip / MD4 / Cryptography / Computing / Hashing

Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2004-12-02 07:12:00
536Internet protocols / Cryptographic software / Internet privacy / Remote administration software / Secure Shell / Proxy server / Port / Transmission Control Protocol / Network address translation / Computing / System software / Internet

REX: Secure, Extensible Remote Execution Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazières, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory, NYU Department of Comp

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-05-05 13:52:30
537Two-man rule / Safety / IEEE 802.1X / Kerberos / Authenticator / Security / Computer network security

Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor? John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
538Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
539Computing / Cryptographic software / Internet privacy / Pretty Good Privacy / Encryption / USB flash drive / Vormetric / Disk encryption hardware / Cryptography / Computer security / Disk encryption

Nine Questions Encryption Vendors Really Don’t Want to Answer A B U Y E R ’ S G U I D E T O E N T E R P R I S E D ATA E N C R Y P T I O N

Add to Reading List

Source URL: download.pgp.com

Language: English - Date: 2008-07-14 18:03:42
540Internet protocols / Internet standards / Portable software / Communication software / PuTTY / Secure Shell / Telnet / Rlogin / X Window System / Software / Computing / Cryptographic software

Connection from Home You can only use the ssh protocol to login to the titanic and pompeii servers from outside the University. You cannot connect using telnet or rlogin. Putty is one package that provides a telnet style

Add to Reading List

Source URL: comp.mq.edu.au

Language: English - Date: 2013-12-09 19:27:25
UPDATE