Encryption

Results: 4595



#Item
821

Laptop full disk encryption checklist (sectionDT/LT/Mobile Device Security #6 May 4, 2011 The left column indicates whether the standard is listed in the Information Security Plan as a Must or Should. A justifica

Add to Reading List

Source URL: security.sdsu.edu

Language: English - Date: 2013-03-13 16:16:44
    822Wireless networking / Technology / Computing / IEEE 802.11 / Wi-Fi / Encryption / Public-key cryptography / Bluetooth / Wireless

    Proposal for EU legislation Mandatory anonymised, authenticated and end-to-end encrypted communications in all tele­pho­ny and computing devices sold after 201x. Status: DRAFT 0.13

    Add to Reading List

    Source URL: youbroketheinternet.org

    Language: English - Date: 2015-09-29 18:17:30
    823Cryptography / Block cipher / BaseKing / 3-Way / Key schedule / Linear cryptanalysis / Cryptanalysis / Data Encryption Standard / VEST / Advanced Encryption Standard / Weak key / Feistel cipher

    Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:16
    824

    Data Hiding Release Notes WetStone Technologies | April 2015  This release covers maintenance to datasets to reduce false positives.  New threats have been added to the Encryption and Steganography categories.

    Add to Reading List

    Source URL: wetstonetech.com

    - Date: 2015-04-17 14:46:57
      825

      APPLICATION FORM - SIGNATURE / ENCRYPTION CERTIFICATE FOR INDIVIDUAL Encryption Application ID: Signature

      Add to Reading List

      Source URL: www.e-mudhra.com

      Language: English - Date: 2015-08-13 06:13:44
        826

        // E-MAIL CERTIFICATE E-mail certificate (S/MIME) allows you to add digital signature and encrypt messages and attachments. It provides you the highest level of online communication security. Encryption means that only y

        Add to Reading List

        Source URL: sslguru.de

        Language: English - Date: 2014-09-03 06:01:00
          827

          APPLICATION FORM - SIGNATURE / ENCRYPTION CERTIFICATE FOR FOREIGN INDIVIDUAL Encryption Application ID: Signature

          Add to Reading List

          Source URL: www.e-mudhra.com

          Language: English - Date: 2015-08-20 07:34:58
            828Cryptography / Computing / Software / Security / Computer security / Password / Internet privacy / Public-key cryptography / Web application / Data Protection API / Dynamic SSL

            Private Use of Untrusted Web Servers via Opportunistic Encryption

            Add to Reading List

            Source URL: w2spconf.com

            Language: English - Date: 2012-02-07 16:10:03
            829

            Data Encryption DESlock+ Data Encryption DESlock+ is a simple-to-use encryption application for companies large and small. Take advantage of the

            Add to Reading List

            Source URL: staging5.esetstatic.com

            Language: English - Date: 2015-11-24 11:49:38
              830

              Nominated Company: digitronic computersysteme GmbH Nomination Title: HiCrypt Easy to install and simply to use encryption and decryption software "Made in Germany" of confidential data´s stored in files on computer syst

              Add to Reading List

              Source URL: www.svcawards.com

              Language: English - Date: 2013-10-07 10:09:17
                UPDATE