Encryption software

Results: 1087



#Item
191ANts P2P / Software / Computing / Thought / Disk encryption / Evaluation / Common Criteria

Full Disk Encryption iTC Newsletter – April 2015 Summary This newsletter provides an update on the progress of the Full Disk Encryption iTC, which is developing two cPPs (Encryption Engine and Authorisation Acquisition

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-04-16 13:18:16
192Computer security / Internet / Email authentication / Public-key cryptography / PGP / Pretty Good Privacy / Email / Cincinnatus / Encryption / Cryptography / Internet privacy / Cryptographic software

Metropolitan Books Henry Holt and Company, LLC Publishers sinceFifth Avenue New York, New Yorkwww.henryholt.com

Add to Reading List

Source URL: us.macmillan.com

Language: English - Date: 2015-04-28 11:19:09
193Computing / Password / European Insurance and Occupational Pensions Authority / FreeOTFE / On-the-fly encryption / Email / Database / System software / Cryptographic software / Disk encryption / Software

CEIOPS-QIS5November 2010 Process for analysing group data in QIS5 - main characteristics -

Add to Reading List

Source URL: eiopa.europa.eu

Language: English - Date: 2015-05-04 10:37:08
194Electronic commerce / PKCS / RSA / Cryptographic software / Cryptography / Public-key cryptography / Advanced Encryption Standard

SECURE MICROCONTROLLER   SOLUTIONS Applications •  Internet of Things •  Energy and Water

Add to Reading List

Source URL: www.insidesecure.com

Language: English
195Universal Mobile Telecommunications System / Stream ciphers / SNOW / 3GPP / European Telecommunications Standards Institute / Algorithm / System Architecture Evolution / GSM / Advanced Encryption Standard / Software-defined radio / Cryptography / Internet Protocol

PDF Document

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:55
196Cipher / Cryptanalysis / Symmetric-key algorithm / RC4 / Encryption software / Index of cryptography articles / Differential cryptanalysis / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
197Fault injection / Software testing / RSA / Glitch / Differential fault analysis / Advanced Encryption Standard / Fault / Ciphertext / Power analysis / Cryptography / Geology / Digital electronics

The Sorcerer’s Apprentice Guide to Fault Attacks Hagai Bar-El1 Hamid Choukri2,3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-07 04:14:56
198Security / Computer security / Cryptographic software / Crypt / Password manager / Disk encryption / Password psychology / Cryptography / Password / Passphrase

NinjaStik First time use instructions Welcome to your new NinjaStik – online anonymity made easy. Getting started: Turn off your computer, plug the NinjaStik into a USB port, turn on your computer. You will need to tel

Add to Reading List

Source URL: www.ninjastik.com

Language: English - Date: 2013-08-06 14:51:07
199Software / Notepad / Crypt / System software / Special purpose file systems / Encrypting File System / Cipher / Microsoft Windows / Cryptographic software / Disk encryption

PDF Document

Add to Reading List

Source URL: bitcrypt.moshe-szweizer.com

Language: English - Date: 2011-10-02 15:46:24
200Computer security / Email authentication / Public-key cryptography / Encryption / Secure communication / Tor / Cipher / Symmetric-key algorithm / Email encryption / Cryptography / Internet privacy / Cryptographic software

ACLU Submission to the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression February 10, 2015 The American Civil Liberties Union thanks the Special Rapporteur on the Promot

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
UPDATE