Cryptography

Results: 21893



#Item
651Prevention / Security / Safety / Computer security / National security / Data security / Cryptography / Information security / Risk / Threat / Resilience / Human security

Security Metrics and Security Investment Models Rainer B¨ohme International Computer Science Institute, Berkeley, California, USA

Add to Reading List

Source URL: informationsecurity.uibk.ac.at

Language: English - Date: 2016-07-15 15:37:41
652Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / E-commerce / StartCom / Extended Validation Certificate / Certificate authority / X.509 / S/MIME / Public key certificate

Start Commercial (StartCom) Limited StartSSL™ Certificates & Public Key Infrastructure Eilat, Israel Addendum to the StartCom Certification Authority

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2015-11-26 02:27:34
653Cryptography / Labor in the Philippines / Department of Labor and Employment / Intramuros / Manila / Dole / Public key certificate / Sipag Pinoy

Republic of the Philippines DEPARTMENT OF LABOR AND EMPLOYMENT Muralla St., Intramuros, Manila Certificate No.: AJA15PUBLICATION OF VACANT POSITIONS

Add to Reading List

Source URL: www.dole.gov.ph

Language: English - Date: 2016-07-18 02:42:36
654Cryptography / Health Insurance Portability and Accountability Act / Health insurance / Medical privacy / Public key certificate

DOC Document

Add to Reading List

Source URL: www.hektoen.org

Language: English - Date: 2015-03-17 12:29:04
655Disk encryption / Cryptography / Cryptographic software / Hardware-based full disk encryption / Advanced Encryption Standard / USB flash drive / USB / Encryption / BitLocker

Microsoft Word - X-Wall DX_FAQ_v1.1.doc

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-11-21 01:52:00
656Quantum information science / Quantum cryptography / Mathematical analysis / Cryptography / Quantum key distribution / Leftover hash lemma / Expected value / Mathematics / Applied mathematics / Quantum mechanics / Orthogonal polynomials

1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2016-01-25 05:30:01
657Cryptography / Signature / Computer law / Cryptography standards / Key management / E-commerce / Public key certificate / Electronic signature / Professional certification / Digital signature / ZertES / Trust service provider

Law_on_Electronic_Signature

Add to Reading List

Source URL: www.nekretnine.co.me

Language: English - Date: 2013-07-17 07:56:10
658Cryptography / Cyberwarfare / Malware / Computer security / Cryptovirology / Ransomware / Random number generation / Computer virus / Pseudorandomness / PGPCoder / Random seed / Deniable encryption

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
659Cryptography / Economy / Payment systems / Money / Debit cards / Key management / Public key infrastructure / Public-key cryptography / Gift card / Email / Public key certificate / Credit card

DOC Document

Add to Reading List

Source URL: www.greendisk.com

Language: English - Date: 2007-12-14 16:55:37
660Cryptography / International Electrotechnical Commission / Standards organizations / Kitemark / Product safety / BSI Group / Framfield / Public key certificate / Management system / Chiswick

Certificate of Registration QUALITY MANAGEMENT SYSTEM - ISO 9001:2008 This is to certify that: Chris Blandford Associates The Old Crown

Add to Reading List

Source URL: www.cbastudios.com

Language: English - Date: 2015-03-06 13:32:29
UPDATE