Encryption

Results: 4595



#Item
471Computer network security / Authentication protocols / BitLocker / Disk encryption / Windows 7 / Windows Server / Password / Kerberos

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
472Cryptography / Disk encryption / Cryptographic software / Public-key cryptography / Data security / Encryption / Linear Tape-Open / IEEE P1619 / Symmetric-key algorithm / Magnetic tape data storage / Cipher / Key

Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:31:20
473Public-key cryptography / Public key infrastructure / Cryptography / Ko / Certificate authority / End-to-end encryption

Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad Alptekin Küpçü

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
474

Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA Mariana Raykova

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-21 10:06:46
    475

    FOR IMMEDIATE RELEASE Congress Has Role to Play in Fostering Encryption Dialogue, Says CTA Arlington, VA - March 1, The following statement is attributed to Gary Shapiro, president and CEO, Consumer Technology As

    Add to Reading List

    Source URL: homeland.house.gov

    Language: English - Date: 2016-03-01 16:00:39
      476

      The proceedings version of this papers, entitled The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs, appears in Advances in Cryptology – Eurocrypt 2006, LNCS vol. 4004, Springer, pp. 4

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2008-11-28 22:41:48
        477Public-key cryptography / Secure multi-party computation / Homomorphic encryption / Algorithm / Block cipher mode of operation / Communications protocol / Cryptographic protocol

        Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

        Add to Reading List

        Source URL: www.fkerschbaum.org

        Language: English - Date: 2013-03-24 11:27:34
        478Microsoft / Computing / Software / Webmail / Electronic documents / Email authentication / Email / Outlook.com / Sophos

        HOW TO USE SOPHOS SECURE EMAIL The Sturm Financial Group companies (ANB Bank, Community First Data Services and Sturm Financial Group) use secure email by Sophos SPX Encryption. Our Sophos software scans all outgoing ema

        Add to Reading List

        Source URL: www.anbbank.com

        Language: English - Date: 2015-12-21 17:00:25
        479

        Encryption schemes secure under related-key and key-dependent message attacks Florian B¨ ohl1? , Gareth T. Davies2?? , and Dennis Hofheinz1? ? ? 1

        Add to Reading List

        Source URL: www.kjdf.de

        Language: English - Date: 2014-06-10 05:37:31
          480

          Tracing Malicious Proxies in Proxy Re-Encryption Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

          Add to Reading List

          Source URL: perso.uclouvain.be

          Language: English - Date: 2008-07-30 08:44:52
            UPDATE