Encryption

Results: 4595



#Item
301Cryptography / Disk encryption / Cryptographic software / Serial ATA / Block cipher mode of operation / Key / Encryption / BestCrypt / Hardware-based full disk encryption

X-Wall MX Introduction

Add to Reading List

Source URL: www.enovatech.com

Language: English - Date: 2015-08-12 02:55:36
302Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
303Cryptography / Public-key cryptography / Homomorphic encryption / Secure multi-party computation / Cryptographic protocol / Paillier cryptosystem / Privacy / Digital signature / Internet privacy / Zero-knowledge proof / Encryption / Cloud computing security

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
304Cryptography / Public key infrastructure / Public-key cryptography / Transport Layer Security / Key management / Computer access control / SOA Security / Security Assertion Markup Language / Revocation list / Online Certificate Status Protocol / WS-Security / Certificate authority

trust claims tokens XML-Encryption

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:27
305Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Transport Layer Security / Internet Standards / HTTPS

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
306Security / Prevention / Cryptography / Safety / Crime prevention / Information governance / National security / Procore / Password / Computer security / Internet privacy / Encryption

Security Overview Understanding the need to address security concerns, Procore has created a multi-tiered approach to ensuring data security and application stability, both integral to maintaining the safekeeping of your

Add to Reading List

Source URL: procore.com

Language: English - Date: 2016-01-08 11:07:49
307Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
308

Auswahl von Zertifikaten für E-Mail Verschlüsselung Author: Stefan Cink Das E-Mail Gateway NoSpamProxy Encryption bietet die automatisierte Signatur und Verschlüsselung

Add to Reading List

Source URL: www.nospamproxy.de

Language: German - Date: 2015-10-23 09:40:39
    309Cryptography / Encryption / Key management / Key / Edward Scheidt / ASC X9 / Crypto Wars

    X9extra Volume 2, Number 4 AugustCryptography 101

    Add to Reading List

    Source URL: x9.org

    Language: English - Date: 2013-10-16 09:39:15
    310Computer security / Security / Prevention / Computer access control / Pre-boot authentication / USB flash drive / Authentication / Trusted Platform Module / Password / Acer N50 / Disk encryption

    Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

    Add to Reading List

    Source URL: static.acer.com

    Language: English - Date: 2013-10-24 05:13:45
    UPDATE