Encryption

Results: 4595



#Item
221

5 Ways to Protect Your Small Business from Account Fraud Greenfield Cooperative Bank already provides numerous security features for protecting customer’s private information, including encryption, multi-factor authent

Add to Reading List

Source URL: www.greenfieldcoopbank.com

- Date: 2015-07-08 09:04:30
    222

    An earlier version of this paper appears at Fast Software EncryptionFSEThe Software Performance of Authenticated-Encryption Modes Ted Krovetz∗

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    - Date: 2011-03-21 19:25:18
      223

      Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribusion Systems with Trade-offs between Communication and Storage Yohei Watanabe and Junji Shikata

      Add to Reading List

      Source URL: security-lab.jaist.ac.jp

      - Date: 2015-11-22 02:25:28
        224Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

        GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

        Add to Reading List

        Source URL: www.cryptophone.de

        Language: English - Date: 2009-10-21 09:08:30
        225Computing / Internet / Network architecture / Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / Units of information / IPsec / Padding / Transport Layer Security / IPv4

        Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

        Add to Reading List

        Source URL: www.isg.rhul.ac.uk

        Language: English
        226Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

        AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2015-02-21 21:04:37
        227Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

        ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

        Add to Reading List

        Source URL: www.crypto.ethz.ch

        Language: English - Date: 2015-05-05 08:36:37
        228Mental health / Health / Changi / SANE / Art therapy / Data Encryption Standard / Painting

        emale improving men’s  health  &  wellbeing issue 117 December 2012 grey is the new black at work boys hit by body blues

        Add to Reading List

        Source URL: changipowart.com

        Language: English - Date: 2015-07-21 22:08:39
        229Cryptography / Public key infrastructure / Cryptographic software / Email authentication / Key management / Email encryption / Public-key cryptography / S/MIME / Key / Encryption / Email / Pretty Good Privacy

        Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2006-06-02 21:42:44
        230Christianity / Catholic liturgy / Pentecost / Shavuot / Eucharist / Rectangular function / Easter / Data Encryption Standard

        Tidings TRINITY EPISCOPAL CHURCH 105 BRIDGE STREET · ELKTON, MARYLANDEMAIL: Phone

        Add to Reading List

        Source URL: www.trinityelkton.org

        Language: English - Date: 2012-06-09 22:59:56
        UPDATE