Encryption

Results: 4595



#Item
661

OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

Add to Reading List

Source URL: www.ironmountain.sk

Language: English
    662

    Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware Thomas P¨oppelmann and Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security, Ruhr University Bochum, Germany

    Add to Reading List

    Source URL: www.sha.rub.de

    Language: English - Date: 2013-08-14 17:59:02
      663Instant messaging clients / Cross-platform software / Videotelephony / Online chat / Cryptography / WhatsApp / End-to-end encryption / Short Message Service / Text messaging / Transport Layer Security / Windows Live Messenger / Instant messaging

      BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Ahmet Talha Ozcan1 , Can Gemicioglu2 , Kaan Onarlioglu3 , Michael Weissbacher3 , Collin Mulliner3 , William Robertson3 , and Engin Kirda3 1

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:32:53
      664

      Online Authenticated Encryption Reza Reyhanitabar EPFL Switzerland

      Add to Reading List

      Source URL: www1.spms.ntu.edu.sg

      Language: English - Date: 2015-10-08 00:33:25
        665

        The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

        Add to Reading List

        Source URL: web.cecs.pdx.edu

        Language: English - Date: 2009-09-29 10:18:42
          666

          Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2015-09-04 19:44:09
            667

            Introduction to ABE Our Construction Application Conclusions Key-policy Attribute-based Encryption for Boolean

            Add to Reading List

            Source URL: www.gstl.itu.edu.tr

            Language: English - Date: 2014-10-20 08:27:00
              668

              WHEN FILE ENCRYPTION HELPS PASSWORD CRACKING PHDays V Sylvain Pelissier, Roman Korkikian May 26, 2015 IN BRIEF

              Add to Reading List

              Source URL: cybermashup.files.wordpress.com

              Language: English - Date: 2015-05-27 02:59:15
                669Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

                Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

                Add to Reading List

                Source URL: www.strongswan.org

                Language: English - Date: 2006-04-27 10:23:08
                670Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

                IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

                Add to Reading List

                Source URL: euler.ecs.umass.edu

                Language: English - Date: 2014-03-28 15:45:17
                UPDATE