Cryptographic software

Results: 2705



#Item
871Password / Cryptographic protocols / One-time password / Authentication / Cryptographic software / Challenge-response authentication / Password-authenticated key agreement / Security / Cryptography / Computer security

Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory) Frank Siebenlist

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2006-04-13 14:21:19
872Series / Cryptographic software / Password cracking / Password / Law firm / Television

DOCX Document

Add to Reading List

Source URL: saylerlegal.com

Language: English - Date: 2014-10-23 18:05:12
873Cryptographic software / Cryptography / Password / Mozilla add-ons / Two-factor authentication / Password manager / Salt / Sticky Password Manager / Software / Security / Computer security

The Security Behind Sticky Password Technical White Paper Executive Summary When it comes to password management tools, concerns over secure data storage of passwords

Add to Reading List

Source URL: www.stickypassword.com

Language: English - Date: 2015-01-13 02:57:57
874Cryptographic protocols / Secure communication / Microsoft Silverlight / Digital rights management / Windows Media / Transport Layer Security / HTTP Secure / Adobe Flash / Microsoft Silverlight History / Software / Computing / PlayReady

Content Protection in Silverlight Microsoft Corporation April 2010 Contents

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2010-04-26 15:21:18
875Software / Computing / Encryption / Data security / USB flash drive / Encrypting File System / BitLocker Drive Encryption / Cryptography / Disk encryption / Cryptographic software

For further information: Paula Elliott C8 Consulting Ltd for Data Encryption Systems Ltd +[removed]339645 / +[removed][removed]removed]

Add to Reading List

Source URL: download.deslock.com

Language: English - Date: 2014-05-01 10:03:18
876Security / Identity management / Computer security / Portable software / LastPass Password Manager / GNOME Keyring / Roboform / Cryptographic software / Software

SIBER SYSTEMS DEBUTS ROBOFORM ONLINE FOR CONVENIENT INTERNET ACCESS OF SECURELY STORED PASSWORDS AND IDENTITIES New In the Cloud Service Provides Most Complete Password Management Solution Available, Automatically Keepin

Add to Reading List

Source URL: www.roboform.com

Language: English
877Identity management / Computer crimes / Password / Cryptographic software / One-time password / LastPass Password Manager / Two-factor authentication / Security token / Keystroke logging / Security / Access control / Computer security

Password Management Security Update - Best Practices for General User uthentication is the process of identifying the authenticity of a user. It can be accomplished by means of a combination of login ID (identification)

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2015-01-28 23:37:15
878Internet standards / Cryptographic software / Public-key cryptography / PGP / FTP / Pretty Good Privacy / FTPS / File Transfer Protocol / Managed file transfer / Cryptography / Internet / Computing

DATA SHEET DIPLOMAT ® EBUSINESS SOLUTION OVERVIEW McAfee® no longer directly supports E-Business Server. If your business relies on McAfee E-Biz Server, try Diplomat eBusiness Solution to replace PGP command line and s

Add to Reading List

Source URL: www.coviantsoftware.com

Language: English - Date: 2014-04-03 17:16:37
879Computing / Password / Remote backup service / Crypt / Encryption / Encrypting File System / FileVault / Cryptographic software / Cryptography / Computer security

White Paper Benefits of Secure Off-Site Online Backup In today’s computing environment, businesses are relying on computers to perform daily business activities as well as mission critical functions. The use of compute

Add to Reading List

Source URL: www.firstbackup.com

Language: English - Date: 2007-03-16 17:00:00
880Digital media / Cross-platform software / Disk encryption / TrueCrypt / Email / Indiana University South Bend / Password / David G. Anderson / Internet / Software / Cryptographic software / Computing

Instructions for Secure Modes of Data Transfer for DINAA Participants The Digital Index of North American Archaeology (DINAA) is a multi-institutional undertaking, funded by the National Science Foundation, to create int

Add to Reading List

Source URL: ux.opencontext.org

Language: English - Date: 2012-10-31 18:53:03
UPDATE