Encryption software

Results: 1087



#Item
111

LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win – the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation for all c

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-23 19:30:18
    112

    LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win – the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation for all c

    Add to Reading List

    Source URL: nsrc.org

    Language: English - Date: 2015-02-23 19:28:37
      113Security / Email authentication / Cryptographic software / Secure communication / Clipper chip / Disk encryption / National Security Agency / Pretty Good Privacy / Email encryption / Cryptography / Internet privacy / Computer security

      Bankston_short_biographical_summary

      Add to Reading List

      Source URL: static.newamerica.org

      Language: English - Date: 2015-05-04 13:25:41
      114Cryptographic hash functions / Hashing / Advanced Encryption Standard / Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Open Source Software Institute / SHA-2 / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

      OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

      Add to Reading List

      Source URL: openssl.org

      Language: English - Date: 2007-12-13 15:11:03
      115Tokenization / Oracle Corporation / Oracle Database / Encryption / Electronic business / Oracle Media Objects / Vormetric / Transparent Data Encryption / Cryptography / Software / Computing

      Oracle CardConnect is the only Oracle-validated integration for payment security. CardConnect for Oracle provides a central location for the management of encryption keys and tokens in addition to providing services to n

      Add to Reading List

      Source URL: www.cardconnect.com

      Language: English - Date: 2014-12-29 16:44:52
      116Microsoft Windows / Trusted computing / Trusted Platform Module / Cryptographic software / Trusted Computing Group / Hardware-based full disk encryption / Data security / Encryption / FIPS 140-2 / Cryptography / Computer security / Disk encryption

      Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

      Add to Reading List

      Source URL: www.trustedcomputinggroup.org

      Language: English - Date: 2010-05-19 15:06:35
      117Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

      A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

      Add to Reading List

      Source URL: www.spice-center.org

      Language: English - Date: 2012-12-19 05:32:22
      118X86 architecture / Cryptographic software / AES instruction set / Advanced Encryption Standard / OpenSSL / X86-64 / X86 / Itanium / Xeon / Computer architecture / Computing / Instruction set architectures

      OpenSSL FIPS Object Module VersionBy the OpenSSL Software Foundation

      Add to Reading List

      Source URL: openssl.org

      Language: English - Date: 2014-06-06 13:16:17
      119Computing / Internet protocols / Cryptographic software / Email / Cryptographic protocols / X.509 / Domain Name System Security Extensions / Opportunistic encryption / S/MIME / Cryptography / Internet / Public-key cryptography

      Intro The Plan Implementation

      Add to Reading List

      Source URL: www.g10code.com

      Language: English - Date: 2011-11-14 04:16:35
      120Cross-platform software / Oracle Database / X Window System / Client–server model / Software / Computing / Relational database management systems

      Dynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign Abstract—Dynamic Searchable Symmetric Encryption allows a client to store a

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2014-04-21 13:48:10
      UPDATE