Encryption

Results: 4595



#Item
871

Keeper Security, Inc. is the creator of Keeper, the world’s most secure, ease-to-use, password manager and digital vault that uses military-grade encryption technology to store your website logins, passwords, financial

Add to Reading List

Source URL: d3fyaiwg010let.cloudfront.net

Language: English - Date: 2015-01-02 20:13:55
    872Cryptographic software / Software / BitLocker Drive Encryption / Windows 7 / Windows Server / Windows Vista / Block cipher / Encryption / Advanced Encryption Standard / Cryptography / Disk encryption / Microsoft Windows

    AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista Niels Ferguson Microsoft August 2006

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2014-07-10 13:02:24
    873USB / Aloaha / Non-volatile memory / Cryptographic software / Password / Portable Document Format / Public-key cryptography / S/MIME / Electronic business / Computing / Cryptography / Disk encryption

    Aloaha PDF Crypter Digital Rights Management for PDF Documents

    Add to Reading List

    Source URL: www.aloaha.com

    Language: English
    874Philosophy of biology / Homomorphic encryption / Genetic epidemiology / Abstract algebra / Single-nucleotide polymorphism / Genetic association / Genome-wide association study / Cloud computing / Euclidean vector / Biology / Genetics / Cryptography

    2015 IEEE CS Security and Privacy Workshops Efficient Secure Outsourcing of Genome-wide Association Studies Wenjie Lu

    Add to Reading List

    Source URL: www.genopri.org

    Language: English - Date: 2015-05-21 15:25:06
    875Password / Software / Access control / Security / Mozilla add-ons / SafeWallet Password Manager / Cryptographic software / Identity management / Password manager

    Keeper Security, Inc. is the creator of Keeper, the world’s most secure, ease-to-use, password manager and digital vault that uses military-grade encryption technology to store your website logins, passwords, financial

    Add to Reading List

    Source URL: d3fyaiwg010let.cloudfront.net

    Language: English - Date: 2015-06-08 18:50:40
    876

    The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

    Add to Reading List

    Source URL: www.tcpcrypt.org

    Language: English - Date: 2010-06-02 09:05:19
      877Cryptography / Proxy re-encryption

      Cryptographically Enforced Distributed Data Access Control Luan Ibraimi Composition of the Graduation Committee: Prof. Dr. Ir.

      Add to Reading List

      Source URL: eprints.eemcs.utwente.nl

      Language: English - Date: 2011-10-24 09:53:48
      878Electronics / Aloaha / Non-volatile memory / Cryptography standards / Public-key cryptography / Factory reset / Smart card / Reset / PKCS / Computing / Disk encryption / USB

      Microsoft Word - Personalisation of Aloaha Card.docx

      Add to Reading List

      Source URL: www.aloaha.com

      Language: English - Date: 2014-02-19 09:27:40
      879Semantic security / Optimal asymmetric encryption padding / Cipher / RSA / Advantage / Encryption / Side channel attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

      main_CameraReadyFormatting.dvi

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2012-05-14 19:11:08
      880Computing / Microsoft Windows / Computer peripherals / Non-volatile memory / Data management / Solid-state drive / Hardware-based full disk encryption / Hard disk drive / Encryption / Disk encryption / Computer hardware / Cryptographic software

      SelfEncrypting Drive Market & Technology Report Thomas M. Coughlin Coughlin Associates, Inc.

      Add to Reading List

      Source URL: www.trustedcomputinggroup.org

      Language: English - Date: 2011-09-21 11:46:13
      UPDATE