Cryptographic software

Results: 2705



#Item
71Hacking / Disk encryption / Cryptographic software / Inode / HTTP cookie / JavaScript / BitLocker / Cross-site scripting / Vulnerability / Encrypted filesystem / Encryption / Stat

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
72Cryptographic protocols / Computing platforms / Virtual private networks / Internet protocols / Cryptographic software / IPv6 / IPsec / Xen / NetBSD / Linux / Openswan / Internet Key Exchange

Michael Richardson (v:Personal Information Languages English Fluent, French Conversational Contact Information Address: 470 Dawson Avenue, Ottawa, Ontario, K1Z 5V7

Add to Reading List

Source URL: www.sandelman.ca

Language: English - Date: 2014-10-15 11:56:16
73Disk encryption / Cryptographic software / Cryptography / NTFS / Windows Vista / Encryption / Encrypting File System / Windows / Security and safety features new to Windows Vista

  File-encryption tool secureEFS

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2006-10-11 09:39:11
74Internet privacy / Statistical theory / Cryptographic software / Degree of anonymity / Crypto-anarchism / Crowds / Anonymity / Philosophy of thermal and statistical physics / Mix network / Entropy / Information theory / Traffic analysis

Measuring Relationship Anonymity in Mix Networks Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT Many applications of mix networks such as anonymous Web browsing require relationship anonym

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:56:09
75Cryptographic software / Disk encryption / Cryptography / Computer virus / Internet security / Encryption / Trojan horses / Encrypting File System / EncFS

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. To decrypt the files:

Add to Reading List

Source URL: www.nomoreransom.org

Language: English - Date: 2016-07-25 04:33:08
76Error detection and correction / Transmission Control Protocol / Checksum / Cryptographic hash function / Hash function / Malware / Cache

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction Yanlin Li1 , Yueqiang Cheng1 , Virgil Gligor1(B) , and Adrian Perrig2 1 2

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-12-08 03:13:02
77Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
78Public-key cryptography / Public key infrastructure / Key management / Cryptographic protocols / E-commerce / Public key certificate / Outlook.com / Email / Form / Certificate authority / X.509

Software VersionEnd User Guide Release Date: 10th March, 2011 InCommon

Add to Reading List

Source URL: wiki.mst.edu

Language: English - Date: 2011-07-26 12:43:50
79Smart cards / PGP / Cryptographic software / Privacy software / Archive formats / ISO/IEC / GNU Privacy Guard / Dd / Smart card application protocol data unit / Communications protocol / Tar

Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems

Add to Reading List

Source URL: www.g10code.de

Language: English - Date: 2015-11-01 10:38:20
80ISO standards / Windows Vista / Cryptographic software / Trusted Platform Module / Trusted computing / Computer access control / BitLocker / Form / Android / HTTP cookie

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
UPDATE