Encryption

Results: 4595



#Item
421IOS / FBIApple encryption dispute / IPhone / Apple Inc. / All Writs Act / Surveillance / Internet privacy

PDF Document

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2016-03-03 18:36:31
422Law enforcement in Europe / Schengen Routing / Schengen Area / Routing / Border Gateway Protocol / Schengen

Schengen routing or Schengen encryption? Secure communication and digital sovereignty in Europe Prof. Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-23 13:40:12
423Data Encryption Standard / Key size / Cryptographic protocols / Cryptographic software / Disk encryption / Index of cryptography articles / IPsec

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-10-15 13:48:57
424Cross-platform software / Cryptographic software / Discontinued software / Disk encryption / TrueCrypt / PING / Email / Outlook.com

Click  Collec)on  System  Dataset  Request  Form Please  use  this  form  when  reques2ng  a  copy  of  the  Click  Collec2on  System  Dataset  from  the  IU

Add to Reading List

Source URL: carl.cs.indiana.edu

Language: English - Date: 2013-05-28 14:48:39
425Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / IPsec / Ping / Authenticated encryption / Network packet / Security Parameter Index / IPv4 / Transmission Control Protocol / Padding

On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-12-10 09:12:20
426Disk encryption theory / Cryptography / Block cipher / Advantage / Stream ciphers / Cipher / Vigenre cipher / Format-preserving encryption

A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:29
427Redundant code / Source code / Tiny Encryption Algorithm / J

CONTENTS Preface iii Organizing Committees

Add to Reading List

Source URL: www.icste.org

Language: English - Date: 2013-11-22 05:19:37
428Hacking / Disk encryption / Cryptographic software / Inode / HTTP cookie / JavaScript / BitLocker / Cross-site scripting / Vulnerability / Encrypted filesystem / Encryption / Stat

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
429Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
430Biometrics / Surveillance / Private biometrics / Security / Fuzzy extractor / Password / Authentication / Facial recognition system / Computer security / Biometric passport / Biometric points

CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2007-10-07 17:21:58
UPDATE