Encryption software

Results: 1087



#Item
131Software / Tunneling protocols / Disk encryption / Windows Server / Windows Vista / OpenVPN / Virtual private network / BitLocker Drive Encryption / Hamachi / Computer network security / Computing / Computer security

Lock down Your Laptop Smart Card Creating a Windows Login Password Lock your laptop by making sure that your Windows user account is set up to require a password on log- in. A log- in password won’t protect against an

Add to Reading List

Source URL: www.cannon.af.mil

Language: English - Date: 2014-12-03 12:43:09
132FIPS 140-2 / FIPS 140 / Cryptographic software / Data Encryption Standard / Zeroisation / Internet Key Exchange / Key Wrap / AES implementations / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 206k - µMACE_Security_Policy R010706 - MotApprovaed.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 07:39:47
133Computer hardware / Windows XP / USB flash drive / Universal Serial Bus / AutoRun / Windows Vista / Windows / Data loss prevention software / USB mass-storage device class / Microsoft Windows / Computer security / Computing

Wave Protector Port & Device Control and Removable Media Encryption p Protect your enterprise from data leakage and theft

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:01
134ID-based cryptography / Cyberwarfare / Security / Key management / Boneh/Franklin scheme / Applied mathematics / Cryptography / ID-based encryption / Public-key cryptography

Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
135Data security / Data / Computer security / Encryption / McAfee / Data loss / Check Point / Data loss prevention software / Computing / Cryptography / Data management

Wave Data Protection Suite Complete Visibility, Control and Protection Adhere to regulatory data security and privacy standards Maintain optimal balance

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:08:54
136Transparent Data Encryption / Oracle Database / Oracle Corporation / Keystore / Oracle RAC / Key management / Oracle Enterprise Manager / Oracle Application Express / Vormetric / Software / Disk encryption / Computing

Oracle® Database Advanced Security Guide 12.1 E50333-09 May 2015

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-05-28 23:47:04
137Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
138Internet standards / Internet protocols / Remote administration software / Telnet / FTP / IBM / File Transfer Protocol / NCSA Telnet / Internet / Computing / Network architecture

TA 15-12: Telnet and FTP Encryption ATTENTION: All Telnet (TN3270) and FTP Customers ACTION REQUESTED: Test and validate encrypted access to customer applications DUE DATE: October 1, 2015 Introduction:

Add to Reading List

Source URL: www.dts.ca.gov

Language: English - Date: 2015-05-28 16:35:15
139Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows 7 / Windows Server / Trusted Platform Module / NTFS / Advanced Encryption Standard / Key generation / Microsoft Windows / Cryptography / Disk encryption

Implementing BitLocker Drive Encryption for Forensic Analysis∗ Jesse D. Kornblum, ManTech International Corporation Abstract

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-02-04 11:20:57
140Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Zero-knowledge proof / ElGamal encryption / Symmetric-key algorithm / RSA / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext indistinguishability

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
UPDATE