Encryption software

Results: 1087



#Item
21CMYK / .eps  Facebook “f ” Logo CMYK / .eps

CMYK / .eps Facebook “f ” Logo CMYK / .eps

Add to Reading List

Source URL: fbnewsroomus.files.wordpress.com

Language: English - Date: 2016-07-08 12:43:14
22Intro  The Plan Implementation

Intro The Plan Implementation

Add to Reading List

Source URL: www.g10code.de

Language: English - Date: 2015-11-01 10:38:20
23Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
24Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
25Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-03-03 02:38:59
26Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
27ownCloud Security and Encryption 2.0 A Technical Overview As the use of file sharing increases across the industry, more attention is being paid to the inherent security of these solutions and the need for corporations t

ownCloud Security and Encryption 2.0 A Technical Overview As the use of file sharing increases across the industry, more attention is being paid to the inherent security of these solutions and the need for corporations t

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-12 11:34:59
28X-Wall MX Introduction

X-Wall MX Introduction

Add to Reading List

Source URL: www.enovatech.com

Language: English - Date: 2015-08-12 02:55:36
29Power Analysis of Android Full Disk Encryption Advisor(s): Thomas Korak, Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Power Analysis of Android Full Disk Encryption Advisor(s): Thomas Korak, Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
30Harnessing Symmetric Encryption and Checksums Ike Antkare International Institute of Technology United Slates of Earth  A BSTRACT

Harnessing Symmetric Encryption and Checksums Ike Antkare International Institute of Technology United Slates of Earth A BSTRACT

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:28