Encryption

Results: 4595



#Item
571

[git] • Branch: master @ 88d0df1 • Release: v0) Head tags: v0.2.3 Key Security Features 1Password for Teams offers a number of notable security features, including True end-to-end encryption All cryp

Add to Reading List

Source URL: www.1password.com

Language: English - Date: 2016-04-13 14:05:22
    572Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

    Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:50:20
    573Email / Internet protocols / Spam filtering / Message transfer agents / Opportunistic TLS / Simple Mail Transfer Protocol / DMARC / Postfix / Transport Layer Security / DomainKeys Identified Mail / Opportunistic encryption / Extended SMTP

    Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

    Add to Reading List

    Source URL: zakird.com

    Language: English
    574Software engineering / Software / Computing / PHP / Symfony / Timon and Pumbaa / Dependency injection / Tiny Encryption Algorithm / Schrter / Timon

    DI Dependency Injection Timon Schroeter 1

    Add to Reading List

    Source URL: www.bephpug.de

    Language: English - Date: 2016-04-12 06:32:40
    575

    Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1 Stanford University

    Add to Reading List

    Source URL: iot.stanford.edu

    Language: English - Date: 2015-11-12 17:49:16
      576Formal epistemology / Modal logic / Artificial intelligence / Non-classical logic / Philosophical logic / Dynamic epistemic logic / Symbol / Epistemic modal logic / Common knowledge / Tiny Encryption Algorithm / Kripke semantics / Interpretation

      Coalitions and Announcements ◦ Thomas Agotnes Hans van Ditmarsch

      Add to Reading List

      Source URL: folk.uib.no

      Language: English - Date: 2008-02-06 12:58:25
      577

      RESTRICTED MORPHO 23rd International Conference on Fast Software Encryption (FSEThere is Wisdom in Harnessing the

      Add to Reading List

      Source URL: fse.rub.de

      Language: English - Date: 2016-03-22 07:25:56
        578Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

        Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

        Add to Reading List

        Source URL: www.schneier.com

        Language: English - Date: 2015-12-10 18:36:20
        579Computing / Hadoop / Cloud computing / Free software / Apache Software Foundation / Cloud infrastructure / Apache Hadoop / Structured storage / Hortonworks / Apache HBase / Sqoop / Encryption

        Encryption and Anonymization in Hadoop Current and Future needs Page 1 SeptApacheCon, Budapest

        Add to Reading List

        Source URL: events.linuxfoundation.org

        Language: English - Date: 2015-09-26 12:07:04
        580

        Ecient Implementation of the Data Encryption Standard Dag Arne Osvik IVERSIT

        Add to Reading List

        Source URL: www.ii.uib.no

        Language: English - Date: 2004-10-09 23:08:08
          UPDATE