Encryption software

Results: 1087



#Item
261Computing / Software / Windows Mobile / Personal digital assistant / Encryption / Pocket PC / Encrypting File System / Wireless security / Disk encryption / Cryptography / Cryptographic software

Version 1.2 TM Windows Mobile 5.0 PDA, Windows CE, Pocket PC 2005, 2003

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:19:06
262Cryptography / System software / Password / USB flash drive / Security token / Ghost / Windows / Encrypting File System / BitLocker Drive Encryption / Disk encryption / Software / Cryptographic software

TM ENTERPRISE EDITION Version 4

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:18:57
263Proprietary software / Next Magazine / Eben Moglen / Law / Computer law

The Encryption Wars An Interview With Jay Worthington May 2, 2000 A shortened version of this interview was originally published in Issue 1 of Cabinet Magazine in DecemberThe following is the original transcript o

Add to Reading List

Source URL: emoglen.law.columbia.edu

Language: English - Date: 2000-12-17 00:39:33
264Security / Cipher / Advantage / ID-based encryption / XTR / Applied mathematics / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Ciphertext indistinguishability

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 20:36:43
265Block cipher modes of operation / Encryption software / Mask / Entropy / Cryptography / Advanced Encryption Standard / Stream cipher

Detecting Hidden Leakages Amir Moradi1 , Sylvain Guilley2,3 , Annelie Heuser2? 1 Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-03-28 12:51:32
266Security / Computer security / Cryptography / Passphrase / Password / Backup / Remote backup service / Encrypting File System / FileVault / Disk encryption / Cryptographic software / Computing

High Security Online Backup A Cyphertite White Paper February, 2013 Cloud-Based

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-02-11 17:33:51
267BitLocker Drive Encryption / FileVault / Cold boot attack / Advanced Encryption Standard / TrueCrypt / Dynamic random-access memory / Data remanence / Computer memory / Key / Cryptography / Disk encryption / Cryptographic software

Lest We Remember: Cold-Boot Attacks on Encryption Keys

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2014-12-24 15:14:38
268Cryptographic software / Disk encryption / Cryptography / Key management / Key

How it works. High Security Online Backup A simple overview of how Cyphertite safely & securely guards your data.

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-02-11 17:33:51
269Cryptographic hash functions / Cross-platform software / Advanced Encryption Standard / Reconfigurable video coding / Programming paradigms / Dataflow programming / SHA-2 / AES implementations / SHA-1 / Computing / Electronic engineering / Hardware description languages

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
270Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
UPDATE