Encryption

Results: 4595



#Item
201

Fully Homomorphic Encryption Thomas PLANTARD Universiy of Wollongong - Plantard (UoW)

Add to Reading List

Source URL: raim2012.u-bourgogne.fr

- Date: 2012-07-16 09:28:36
    202

    FreedomWorks Urges Against Rash Action in Encryption Debate By Jason Pye | March 1, 2016 PERMALINK Following the introduction of legislation by House Homeland Security Committee Chairman Michael

    Add to Reading List

    Source URL: homeland.house.gov

    - Date: 2016-03-02 13:17:09
      203

      ownCloud File Firewall Policy-based protection from unauthorized actions Network firewalls, SSL and encryption at rest are all part of a traditional security envelope. However, in the age of increasing IT complexity, glo

      Add to Reading List

      Source URL: owncloud.com

      - Date: 2015-05-07 03:55:55
        204

        NoSpamProxy PROTECTION. ENCRYPTION. LARGE FILES. Alle Features im Überblick NoSpamProxy® bietet mit den drei Modulen PROTECTION, ENCRYPTION und LARGE FILES zuverlässigen Schutz vor Spam und Malware, sichere E-Mail-Ver

        Add to Reading List

        Source URL: www.nospamproxy.de

        - Date: 2016-06-13 07:17:35
          205

          File encryption ? ? Encryption certificates

          Add to Reading List

          Source URL: www.a-sit.at

          - Date: 2010-06-23 11:51:44
            206

            The proceedings version of this paper appears asThis is the full version. Authenticated-Encryption with Associated-Data Phillip Rogaway∗ 20 September 2002

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            - Date: 2002-09-30 04:19:16
              207

              A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of Ope

              Add to Reading List

              Source URL: web.cs.ucdavis.edu

              - Date: 2004-02-01 14:53:47
                208

                Exploratory Group Problem: RSA Encryption K. Stange November 5, 2008 This problem counts as THREE exploratory problems. It requires working in a group of at least two people, and at most four. You should submit ONE set o

                Add to Reading List

                Source URL: math.colorado.edu

                - Date: 2015-10-18 16:52:56
                  209

                  Proxy Re-Encryption Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

                  Add to Reading List

                  Source URL: www.iaik.tugraz.at

                  - Date: 2015-09-08 06:00:03
                    210

                    OmniFileStore Encryption Design Review Prepared for: Ken Case Chief Executive Officer Omni Development Inc 1000

                    Add to Reading List

                    Source URL: downloads.omnigroup.com

                    - Date: 2016-08-01 12:44:22
                      UPDATE