Encryption software

Results: 1087



#Item
581Cryptographic software / FIPS 140-2 / Critical Security Parameter / FIPS 140 / Advanced Encryption Standard / SHA-2 / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-29 08:49:50
582Special purpose file systems / Disk encryption / Public-key cryptography / Key management / Filesystem-level encryption / NTFS / Key size / Folder / Computer file / Cryptography / Microsoft Windows / Cryptographic software

Cryptree: A Folder Tree Structure for Cryptographic File Systems Dominik Grolimund, Luzius Meisser, Stefan Schmid, Roger Wattenhofer {grolimund@inf., meisserl@, [removed]., [removed].}ethz.ch Computer Engi

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
583Data security / Cassidian / Encryption / Pretty Good Privacy / Key size / Backup / Cryptography / Public-key cryptography / Cryptographic software

Data Security and Encryption Policy Cassidian Communications, Inc. At Cassidian Communications, Inc. (“Cassidian Communications”), we are always conscious and respectful of personal privacy. The following is an over

Add to Reading List

Source URL: www.airbus-dscomm.com

Language: English - Date: 2014-08-02 23:05:09
584Cryptographic software / HMAC / Hashing / FIPS 140 / Advanced Encryption Standard / Cisco IOS / Cisco Systems / Crypto++ / Network Security Services / Cryptography / Cryptography standards / Computing

Microsoft Word - IC2M Security Policy_rel(1.5).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-15 15:13:53
585Cryptographic software / Advanced Encryption Standard / FIPS 140-2 / SHA-1 / SHA-2 / PKCS / Key size / Cryptographic Module Validation Program / HMAC / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 1i - SKB_4.6.0_Security_Policy_2014[removed]docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:38:26
586Military technology / United States Department of Commerce / Industrial design / Antivirus software / Information technology management / WhatsUp Gold / Macintosh / System software / Export Control Classification Number / Identifiers

Product Classification Matrix PRODUCT Encryption Level ECCN/LIC CCATS

Add to Reading List

Source URL: www.ipswitch.com

Language: English - Date: 2014-10-29 23:04:47
587Computer security / Lightweight Portable Security / Crypt / Passphrase / Zip / Encryption / Encrypting File System / Filesystem-level encryption / Cryptographic software / Disk encryption / Cryptography

INFORMATION SERVICES MANAGEMENT CENTER (UIS)

Add to Reading List

Source URL: www.usuhs.mil

Language: English - Date: 2014-11-17 14:34:36
588Public-key cryptography / Secure communication / Cryptographic software / Extensible Messaging and Presence Protocol / HTTP Secure / Opportunistic encryption / X.509 / Transport Layer Security / Simple Mail Transfer Protocol / Cryptography / Computing / Cryptographic protocols

File: /tmp/hosts-2.txt IS IT TIME TO BRING BACK THE HOSTS FILE? INELEGANT ENCRYPTION SOLUTIONS FOR AN INELEGANT NETWORK? Peter Eckersley, Technology Projects Director Electronic Frontier Foundation

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
589Encryption / USB flash drive / Internet privacy / Data security / Computer security / Backup / Security / Disk encryption software / Password manager / Disk encryption / Cryptography / Password

Guidelines for secure storage & handling of electronic human subject research data Traditionally, the confidential handling of human subject research data was achieved by keeping paper files securely locked in cabinets

Add to Reading List

Source URL: www.uaf.edu

Language: English - Date: 2014-09-30 20:10:15
590Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE