Encryption

Results: 4595



#Item
891Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
892Espionage / Packaging / Disk encryption / Tamper resistance / Computer security / FIPS 140-2 / IBM / Data security / Encryption / Cryptography / Security / Technology

Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory An important part of the tutorial will lie in conveying the insights of how practical limitations of

Add to Reading List

Source URL: www.sigsac.org

Language: English - Date: 2008-10-06 10:03:17
893

BRICS Basic Research in Computer Science BRICS RSJ. B. Nielsen: Non-Committing Encryption is Too Easy in the Random Oracle Model Non-Committing Encryption is Too Easy in

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-12-13 04:58:29
    894Cryptographic software / Email authentication / Email encryption / Encryption / Key disclosure law / Tor / Data security / Telecommunications data retention / Secure communication / Cryptography / Internet privacy / Public-key cryptography

    Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

    Add to Reading List

    Source URL: hrp.law.harvard.edu

    Language: English - Date: 2015-06-16 21:46:00
    895PBKDF2 / Password manager / Password / Cryptographic software / Passphrase / Key management / Trusted Platform Module / Key stretching / Sticky Password Manager / Cryptography / Computer security / Security

    “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 15:32:02
    896Information technology management / Data management / Crime prevention / National security / Backup / Off-site data protection / Data remanence / Computer security / Data center / Computing / Security / Data security

    OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

    Add to Reading List

    Source URL: www.ironmountain.ro

    Language: English
    897

    ™ EncryPtion Can you figure out the encrypted message? If you need a little help, just flip the paper upside down. The answer is at the bottom.

    Add to Reading List

    Source URL: www.bookitprogram.com

    - Date: 2014-07-23 12:41:08
      898Hashing / Data Encryption Standard / Finite fields / HMAC / Triple DES / Advanced Encryption Standard / SHA-2 / RSA / CMAC / Cryptography / Message authentication codes / Cryptographic hash functions

      CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

      Add to Reading List

      Source URL: www.ecsec.jp

      Language: English - Date: 2014-09-26 04:10:08
      899Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

      An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-02-21 12:47:44
      900

                                                                 BestCrypt Volume Encryption Help File

      Add to Reading List

      Source URL: www.jetico.com

      Language: English - Date: 2013-05-06 03:17:27
        UPDATE