Encryption software

Results: 1087



#Item
601Internet protocols / Secure communication / Cryptographic protocols / Hashing / Transport Layer Security / Cipher suite / HMAC / Advanced Encryption Standard / FIPS 140-2 / Cryptography / Computing / Cryptographic software

Microsoft Word - 400e - Accellion SW Security Policy_Acc2 redlined -HL2-accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-17 14:04:31
602Cryptographic hash functions / FIPS 140-2 / SHA-2 / SHA-1 / Microsoft CryptoAPI / FIPS 140 / Advanced Encryption Standard / Key size / PKCS / Cryptography / Cryptography standards / Cryptographic software

SafeGuard® CryptoServer Se FIPS[removed]Non-Proprietary Security Policy http://hsm.utimaco.com Imprint

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-03 08:19:11
603FIPS 140-2 / Advanced Encryption Standard / Computer security / Key Wrap / Signcryption / Cryptography / Cryptographic software / Encryption

The most basic requirement is to encrypt FTI during transmission Information systems that receive, process, store, or transmit FTI, must: a. Protect the confidentiality and integrity of transmitted information. b. Imple

Add to Reading List

Source URL: www.taxadmin.org

Language: English - Date: 2014-10-16 15:56:57
604Encryption software / Encryption / Cipher / Science / Computer security / Security / Block cipher modes of operation / Network Security & Cryptography / On-the-fly encryption / Cryptography / Cryptographic software / Disk encryption

CALIFORNIA STATE SCIENCE FAIR 2014 PROJECT SUMMARY Name(s) Aadarsh Jha

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2014-04-25 17:11:38
605Hashing / Key management / Cryptographic software / HMAC / FIPS 140-2 / Key Wrap / FIPS 140 / Key size / CryptGenRandom / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 1a - Oristar SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 17:26:15
606System software / Computing / Encryption / BitLocker Drive Encryption / Encrypting File System / Disk encryption / Cryptographic software / Software

WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS ........................................ How Endpoint Encryption Works Who should read this paper

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2014-11-12 11:43:42
607Windows Vista / SYS / Installation software / Software distribution

ATTENTION: ACTION REQUIRED BEFORE[removed]OR IVES WILL STOP WORKING ON YOUR COMPUTER Because of security vulnerabilities with the certificate hashing encryption algorithm called SHA1, the industry is not allowing any

Add to Reading List

Source URL: www.idph.state.ia.us

Language: English - Date: 2014-10-15 11:17:25
608Cryptographic software / Internet protocols / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / Cryptographic hash function / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1c - Globo Mobile FIPS 140 Security Policy v1-1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-18 11:12:12
609Internet protocols / Internet standards / Secure communication / FIPS 140-2 / SHA-2 / SHA-1 / Transport Layer Security / Cryptographic Module Validation Program / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: [removed]FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 15:51:49
610System software / Software / Apache Hadoop / Kerberos / Encrypting File System / Filesystem-level encryption / Cryptographic software / Disk encryption / Computing

HDFS-6134 Data at Rest Encryption Transparent Encryption Support Introduction   There are several different layers in the (traditional) stack where encryption can be applied: 

Add to Reading List

Source URL: issues.apache.org

Language: English
UPDATE