Encryption

Results: 4595



#Item
211

On the Joint Security of Encryption and Signature in EMV? Jean Paul Degabriele1 , Anja Lehmann2 , Kenneth G. Paterson1 , Nigel P. Smart3 , and Mario Strefler4 1 Information Security Group, Royal Holloway, University of

Add to Reading List

Source URL: www.isg.rhul.ac.uk

- Date: 2011-12-17 12:03:31
    212

    Data Security at Rest Data Security at Rest provides an enterprise-level management system that configures and manages the actions of data encryption software/devices for stored/archived data; aggregates their reports/e

    Add to Reading List

    Source URL: netcom.army.mil

    - Date: 2009-10-26 18:03:02
      213

      CASE STUDY Validated Point-to-Point Encryption (P2PE)™ Solution THE MERCHANT Protect the Customer. Protect your brand.

      Add to Reading List

      Source URL: www.pcisecuritystandards.org

      - Date: 2016-01-25 05:32:48
        214

        Harnessing Symmetric Encryption and Checksums Ike Antkare International Institute of Technology United Slates of Earth

        Add to Reading List

        Source URL: membres-lig.imag.fr

        - Date: 2014-01-09 04:24:29
          215

          Practice Questions for Exam 1 (Crypto Basics) Question 1-Crypto: Recall that a symmetric-key cryptosystem consists of three functions: a key generator G, an encryption function E, and a decryption function D. For any pai

          Add to Reading List

          Source URL: zoo.cs.yale.edu

          - Date: 2013-10-07 23:40:04
            216

            Appears in Advances in Cryptology – CRYPTOHow to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris1 , Phillip Rogaway2 , and Till Stegers2 1

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            - Date: 2009-09-20 01:41:31
              217

              Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

              Add to Reading List

              Source URL: web.cs.ucdavis.edu

              - Date: 2004-02-12 14:18:41
                218

                The FBI vs. Apple The White House should have avoided this legal and security showdown. February 19, 2016 | Editorial Board The encryption cold war that for two years has pitted Silicon Valley against law enforcement fin

                Add to Reading List

                Source URL: homeland.house.gov

                - Date: 2016-03-02 13:01:33
                  219

                  Proposed National Encryption Commission: There’s No Room for Compromise on Government Backdoors February 29, 2016 Today, Representative Mike McCaul and Senator Mark Warner introduced a bill that would create the Nation

                  Add to Reading List

                  Source URL: homeland.house.gov

                  - Date: 2016-03-01 15:58:43
                    220

                    WHITE PAPER Protecting Confidential Data: The Role of Tape Encryption By Heidi Biggar

                    Add to Reading List

                    Source URL: www.lto.org

                    - Date: 2014-09-08 23:25:13
                      UPDATE