Encryption

Results: 4595



#Item
381Cryptography / Smart cards / ISO standards / Ubiquitous computing / Computer access control / Communications security / Public-key cryptography / Subscriber identity module / Encryption / Point to Point Encryption / Contactless smart card

United States Patent] Chaum

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:12
382Distribution / Manufacturing / Supply chain management / Lean manufacturing / Marketing / Database / Inventory / Data Encryption Standard

Microsoft Word - Arkansas FY 2009 FTR

Add to Reading List

Source URL: datapreservation.usgs.gov

Language: English - Date: 2014-10-21 19:08:57
383Public-key cryptography / Cryptography / Secret sharing / Homeomorphisms / Homomorphic encryption / Cryptographic protocol / Digital signature / Communications protocol / Secure multi-party computation / Universal composability

LNCSPractical Private Information Aggregation in Large Networks

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:54:47
384

NN_infographics_encryption

Add to Reading List

Source URL: edri.org

- Date: 2015-10-19 08:43:32
    385Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology / SHA-1 / Cryptographic Module Testing Laboratory

    Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

    Add to Reading List

    Source URL: www.atsec.com

    Language: English - Date: 2015-09-14 06:51:53
    386GOST standards / Feistel cipher / GOST

    On Efficiency of Block Encryption by Improved Key Schedule Fomichev V.M. Koreneva A.M. CTCryptYaroslavl

    Add to Reading List

    Source URL: ctcrypt.ru

    Language: English - Date: 2016-06-10 06:36:02
    387Applied mathematics / Cryptography / Block ciphers / Data Encryption Standard / Cryptanalysis / Linear cryptanalysis / Differential cryptanalysis / S-box / Advanced Encryption Standard / PRESENT / LOKI

    Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    388Disk encryption / Cryptographic software / Online backup services / Cryptography / Windows Vista / USB flash drive / TrueCrypt / Dropbox / BitLocker / Bluetooth / Encryption / Computer security

    VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES Filming for human rights can be dangerous. It can put you, the people you are filming

    Add to Reading List

    Source URL: librarywebfiles.s3.amazonaws.com

    Language: English - Date: 2015-05-12 14:38:07
    389E-commerce / Payment systems / Financial cryptography / DigiCash / David Chaum / Electronic money / Electronic Frontier Foundation / Internet privacy / Online wallet / Smart card / Privacy / Data Encryption Standard

    EFF: https://w2.eff.org/Privacy/Digital_money/?f=digicash.announce.txt Donate to EFF Enter search terms

    Add to Reading List

    Source URL: www.chaum.com

    Language: English - Date: 2015-05-26 20:06:39
    390Cryptography / Taxation in the United States / Social Security / Universal identifiers / Social Security number / Encryption / Computer security

    Protection of SSNs Procedure Effective Date: Purpose: This procedure will ensure the protection and confidentiality of Social Security Numbers used by the Department of Labor and Industry (DLI). This procedure

    Add to Reading List

    Source URL: serve.mt.gov

    Language: English - Date: 2014-12-12 15:10:39
    UPDATE