Cryptography

Results: 21893



#Item
551Security / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Skybox

Under embargo until release at 8am EST, Wednesday, February 3rd, 2016 Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth The fast-growing security analytics company will use funds to furth

Add to Reading List

Source URL: rembrandtvc.com

Language: English - Date: 2016-02-03 14:13:55
552Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
553Computing / Security / Cryptography / Crime prevention / Information governance / National security / Disk encryption / Computer security / Encryption / Android / Information security / USB flash drive

Desktop, Laptop, and Portable Device DRAFT - Data Classification System Requirements September 12, 2013 Purpose of this document This document outlines and provides an explanation for some of the most important and possi

Add to Reading List

Source URL: facultysenate.mst.edu

Language: English - Date: 2014-01-22 04:21:56
554Cryptography / Security / E-commerce / Dell / RSA Security / RSA / Computer security

RSA Case Study New Sales Approach Yields New High for Million-Dollar-Plus Deals Customer Impact “The greatest value we’ve

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2016-03-24 10:48:14
555Cryptography / Error detection and correction / Hash function / Radio-frequency identification / Cryptographic hash function

Proceedings - NN - Analysing the Molva and Di Pietro Private RFID Authentication Scheme

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:38:30
556Cryptography / Email / Public key certificate

ALL INDIA CONFEDERATION OF THE BLIND Braille Bhawan, Institutional Area, Sector-5, Rohini, Delhi – Phone: , email: _ website: _www.aicb.org.in_

Add to Reading List

Source URL: www.aicb.org.in

Language: English
557Cryptography / Computing / Computational complexity theory / Proof of knowledge / IP / Distribution / Challengeresponse authentication / Communications protocol / ZK / Zero-knowledge proof

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-06 05:37:28
558Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Public key certificate / Certificate authority / Revocation list / Online Certificate Status Protocol / Root certificate / KPN / Certification Practice Statement

Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2016-06-28 10:00:02
559Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / United States Department of Homeland Security / Information security / Professional certification

November 2, 2016 International Conference Registration Open, 7:00 am – 4:00 pm, Trinity A ISSA SIGs Sponsored Breakfast, 7:30 am – 8:15 am, Landmark B/C

Add to Reading List

Source URL: c.ymcdn.com

Language: English - Date: 2016-08-19 07:58:20
560General Services Administration / Government procurement in the United States / Electronic signature / Paperless office / Cryptography / Security / Government / GSA Advantage / Federal Systems Integration and Management Center

e-SignLive-logo-screen

Add to Reading List

Source URL: www.esignlive.com

Language: English - Date: 2016-01-26 06:04:54
UPDATE