Encryption

Results: 4595



#Item
811

// E-MAIL CERTIFICATE E-mail certificate (S/MIME) allows you to add digital signature and encrypt messages and attachments. It provides you the highest level of online communication security. Encryption means that only y

Add to Reading List

Source URL: sslguru.co.nz

Language: English - Date: 2014-09-03 06:01:00
    812

    APPLICATION FORM - SIGNATURE / ENCRYPTION CERTIFICATE FOR ORGANISATION Encryption Application ID: Signature

    Add to Reading List

    Source URL: www.e-mudhra.com

    Language: English - Date: 2015-08-13 06:13:52
      813Electronic voting / Voting / Homomorphic encryption / Electoral fraud / Vote counting / Electoral systems / Politics

      Mixnets in Electronic Voting Ben Adida Cryptography and Information Security Group MIT Computer Science and Artificial Intelligence Laboratory

      Add to Reading List

      Source URL: assets.adida.net

      Language: English - Date: 2011-04-11 17:38:58
      814

      Special Workshop sponsored by the ECRYPT II Network of Excellence SKEW 2011 Symmetric Key Encryption Workshop Collocated with FSE 2011 February 16–17, 2011

      Add to Reading List

      Source URL: skew2011.mat.dtu.dk

      Language: English - Date: 2011-01-12 05:14:31
        815

        IT Security Office VersionEncryption IT managers must contact the IT Security Office for assessment and approval of any encryption tool algorithm and key management before implemented the tool to secure prot

        Add to Reading List

        Source URL: security.sdsu.edu

        Language: English - Date: 2013-03-13 16:16:44
          816

          Orbital ATK Secure Email Saving Information & Attachments from Encrypted Email Messages Why Orbital ATK Secure Email? Email encryption is one of the ways we protect sensitive data from getting into the hands of “the b

          Add to Reading List

          Source URL: www.orbitalatk.com

          Language: English - Date: 2015-02-17 16:14:45
            817

            Fully Homomorphic Encryption using Principal Ideals in Number Rings Fully Homomorphic Encryption using Principal Ideals in Number Rings Dr. Ir. Fre´ Vercauteren Katholieke Universiteit Leuven

            Add to Reading List

            Source URL: homes.esat.kuleuven.be

            Language: English - Date: 2011-08-26 10:47:59
              818

              A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

              Add to Reading List

              Source URL: www.dcsec.uni-hannover.de

              Language: English - Date: 2014-03-07 11:05:16
                819Differential topology / Algebraic topology / Advanced Encryption Standard / Section / Partition of a set / Differential geometry

                LNCSUnderstanding Two-Round Differentials in AES

                Add to Reading List

                Source URL: jda.noekeon.org

                Language: English - Date: 2013-08-28 07:53:25
                820

                Timed-Release and Key-Insulated Public Key Encryption Jung Hee Cheon1 , Nicholas Hopper2 , Yongdae Kim2 , Ivan Osipkov2? 1 2

                Add to Reading List

                Source URL: syssec.kaist.ac.kr

                Language: English - Date: 2012-09-03 21:42:57
                  UPDATE