Encryption

Results: 4595



#Item
391Cryptography / Secure communication / Disk encryption / Cryptographic software / Encryption / Data Encryption Standard / Key size / Crypto phone / Secure voice / VeraCrypt / Cryptography standards

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-02-03 15:53:09
392Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
393American people of German descent / Michael McCaul / Privacy / Computer security / Internet privacy / United States Department of Homeland Security

McCAUL - WARNER COMMISSION ON DIGITAL SECURITY THE CHALLENGE WE FACE Digital security is essential to our way of life. We rely on tools like encryption to exchange emails and texts away from prying eyes, to shop online,

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-02-29 15:40:05
394Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / Hardware security module / SafeNet / FIPS 140 / Cisco Systems / Brocade Communications Systems / Advanced Encryption Standard / Computer security / OpenSSL / Smart card

Cryptographic Module Validation Program FIPSand FIPSModules In Process List Module Name Vendor Name

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:11
395Cryptography / File hosting / Cloud storage / Mega / Websites / Encryption / File hosting service / Genealogy / Ontario Geological Survey / Plaintext

D-OGS Newsletter – February 2013 News & Articles of Interest to Durham-Orange genealogists PO Box 4703, Chapel Hill, NCdues – $President – Fred Mowry

Add to Reading List

Source URL: dogsnc.org

Language: English - Date: 2014-02-25 04:22:14
396Disk encryption / Trusted computing / Trusted Platform Module / Cryptography / Windows Vista / Trusted Computing Group / BitLocker / Cloud computing / Cloud storage / Trusted Execution Technology

cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
397Public-key cryptography / Cryptography / Encryption / Ciphertext indistinguishability / Attribute-based encryption / ID-based encryption / RSA / Cipher / Data Encryption Standard / Identity-based conditional proxy re-encryption / Semantic security

2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:14
398Non-volatile memory / Disk encryption / Data erasure / Data management / Computer security / Data remanence / Disk formatting / Shred / File deletion / Parallel ATA / USB flash drive / Data recovery

Microsoft Word - DataSanitizeTutorial121206b.doc

Add to Reading List

Source URL: tomcoughlin.com

Language: English - Date: 2007-01-10 11:18:02
399ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
400Cloud computing / Cloud storage / Cloud infrastructure / Cloud computing security / Computer security / Cloud applications / Public-key cryptography / Encryption / Crypto cloud computing / Perspecsys

nternational Journal & Magazine of Engineering, Technology, Management and Research Volume 1, Issue 10, October

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:18
UPDATE