Encryption

Results: 4595



#Item
51ECI Named Winner in 2018 Lightwave Innovation Reviews Program Company’s Apollo TM200EN Per-Service Encryption Card Wins in Optical Subsystems Category Petach Tikva, Israel – March 19, 2018 – ECI®, a global provide

ECI Named Winner in 2018 Lightwave Innovation Reviews Program Company’s Apollo TM200EN Per-Service Encryption Card Wins in Optical Subsystems Category Petach Tikva, Israel – March 19, 2018 – ECI®, a global provide

Add to Reading List

Source URL: www.ecitele.com

Language: English - Date: 2018-03-20 03:09:44
    52International Journal of Advanced Networking & Applications (IJANA)  ISSN: IMPLEMENTAION OF PRIVELIGE DATA IN CLOUD COMPUTING BY DOUBLE ENCRYPTION

    International Journal of Advanced Networking & Applications (IJANA) ISSN: IMPLEMENTAION OF PRIVELIGE DATA IN CLOUD COMPUTING BY DOUBLE ENCRYPTION

    Add to Reading List

    Source URL: www.ijana.in

    Language: English - Date: 2016-07-11 03:02:36
      53Mail Encryption With GnuPG VGMF  Jochim Selzer

      Mail Encryption With GnuPG VGMF Jochim Selzer

      Add to Reading List

      Source URL: www.cryptoparty.in

      Language: English - Date: 2014-07-02 12:42:16
        54Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels   Thomas Ristenpart

        Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels Thomas Ristenpart

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2014-02-28 19:09:23
          55International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

          International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

          Add to Reading List

          Source URL: ijcsse.org

          Language: English - Date: 2017-08-04 12:06:49
            56NEXt generation Techno-social Legal Encryption Access and Privacy  nextleap.eu Grant NoProject startedDuration 36 months.

            NEXt generation Techno-social Legal Encryption Access and Privacy nextleap.eu Grant NoProject startedDuration 36 months.

            Add to Reading List

            Source URL: nextleap.eu

            Language: English - Date: 2018-06-25 05:11:58
              57Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago  Krovetz–Rogaway, tomorrow:

              Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago Krovetz–Rogaway, tomorrow:

              Add to Reading List

              Source URL: fse2011.mat.dtu.dk

              Language: English - Date: 2011-02-14 02:32:24
                58HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

                HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

                Add to Reading List

                Source URL: www.chi.uni-hannover.de

                Language: English - Date: 2015-05-21 08:55:30
                  59Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ January 12, 2018—RWC 2018, Zurich, Switzerland

                  Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ January 12, 2018—RWC 2018, Zurich, Switzerland

                  Add to Reading List

                  Source URL: rwc.iacr.org

                  Language: English - Date: 2018-01-16 11:57:21
                  60Efficient Integer Vector Homomorphic Encryption Angel Yu, Wai Lok Lai, James Payor Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139, USA {angelyu, wllai, payor}@mit.edu

                  Efficient Integer Vector Homomorphic Encryption Angel Yu, Wai Lok Lai, James Payor Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139, USA {angelyu, wllai, payor}@mit.edu

                  Add to Reading List

                  Source URL: courses.csail.mit.edu

                  Language: English