Encryption

Results: 4595



#Item
641

© Springer-Verlag, Lecture Notes in Computer Science, (2008) http://www.springerlink.com/content/x02404845g538663/fulltext.pdf Fragmentation and Encryption to Enforce Privacy in Data Storage Valentina Ciriani1 , Sabrina

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:49:58
    642

    Metalinguistically Hardened Caesar-shift Encryption Will Styler Chief Security Officer, the Society for the Prevention of Cruelty to Vowels August 16, 2015

    Add to Reading List

    Source URL: linguisticmystic.com

    Language: English - Date: 2016-02-19 10:19:35
      643

      OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

      Add to Reading List

      Source URL: www.ironmountain.gr

      Language: English
        644

        Keyak v2 Leakage-robust authenticated encryption Guido Bertoni1 Joan Daemen1,2 Michaël Peeters1 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 Radboud

        Add to Reading List

        Source URL: www.cryptoexperts.com

        Language: English - Date: 2015-11-13 04:48:41
          645

          Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam1 , Kenneth Koon-Ho Wong1 , Harry Bartlett1 , Leonie Simpson1 , Ed Dawson1 , and Josef Pieprzyk1,2 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-22 00:02:00
            646

            GSMK CryptoPhone 500 Secure IP mobile phone with 360° mobile device security IP TECHNICAL SPECIFICATIONS Voice Encryption

            Add to Reading List

            Source URL: www.cryptophone.de

            Language: English - Date: 2013-03-05 15:58:41
              647

              Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Craig Gentry IBM T.J. Watson Research Center, U.S. Yuval Ishai

              Add to Reading List

              Source URL: web.eecs.umich.edu

              Language: English - Date: 2015-09-08 16:32:00
                648

                Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp? Yi-Ruei Chen, Shiuan-Tzuo Shen, and Wen-Guey Tzeng Department of Computer Science, National Chiao Tung University, Taiwan yrchen.cs98g@nctu.

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-09-28 09:47:05
                  649

                  Accelerating NTRU based Homomorphic Encryption using GPUs Wei Dai Yarkın Dor¨oz

                  Add to Reading List

                  Source URL: ecewp.ece.wpi.edu

                  Language: English - Date: 2014-07-14 17:50:53
                    650Advantage / XTR / Permutation / Mathematics

                    Cascade Encryption Revisited Peter Gaˇzi1,2 and Ueli Maurer1 2 1

                    Add to Reading List

                    Source URL: pub.ist.ac.at

                    Language: English - Date: 2014-06-19 17:30:22
                    UPDATE