Encryption software

Results: 1087



#Item
61Cryptography / Cryptography standards / Cryptographic software / Computing / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / SHA-2

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-05-11 21:52:06
62Free software / Cryptography / Software / Cloud storage / OwnCloud / Disk encryption / Cryptographic software / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0; A Technical Overview ownCloud, Inc. 57 Bedford Street, Suite 102

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-03-16 13:42:38
63

ETS Corporation Software Developer / Jr. DBA $80k – $100k/year Full Time Professional Position Headquartered in Sterling, Virginia. Duties Design and develop end-to-end encryption payment system that can be integrated

Add to Reading List

Source URL: www.etsms.com

Language: English - Date: 2014-07-28 11:44:31
    64System software / Software / Computing / RAID / BSD disklabel / Fdisk / Disk partitioning / Disk sector / Dd / Comparison of disk encryption software

    softraid boot Stefan Sperling <> EuroBSDcon 2015 Introduction to softraid OpenBSD’s softraid(4) device

    Add to Reading List

    Source URL: www.openbsd.org

    Language: English - Date: 2015-10-03 10:53:06
    65Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

    A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2014-07-17 09:25:52
    66Disk encryption / Cryptographic software / Cross-platform software / Discontinued software / TrueCrypt

    IN THE CITY OF WESTMINSTER MAGISTRATES’ COURT NoDISTRICT JUDGE TEMPIA IN THE MATTER OF AN APPLICATION UNDER SECTION 1 OF THE POLICE PROPERTY ACT 1897 LAURI LOVE

    Add to Reading List

    Source URL: freelauri.com

    Language: English - Date: 2016-04-01 12:29:49
    67Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

    Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

    Add to Reading List

    Source URL: isi.jhu.edu

    Language: English - Date: 2016-03-21 17:23:50
    68Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

    WhatsApp Encryption Overview Technical white paper April 4, 2016

    Add to Reading List

    Source URL: www.whatsapp.com

    Language: English
    69Software engineering / Software / Computing / PHP / Symfony / Timon and Pumbaa / Dependency injection / Tiny Encryption Algorithm / Schrter / Timon

    DI Dependency Injection Timon Schroeter 1

    Add to Reading List

    Source URL: www.bephpug.de

    Language: English - Date: 2016-04-12 06:32:40
    70

    RESTRICTED MORPHO 23rd International Conference on Fast Software Encryption (FSEThere is Wisdom in Harnessing the

    Add to Reading List

    Source URL: fse.rub.de

    Language: English - Date: 2016-03-22 07:25:56
      UPDATE