Encryption

Results: 4595



#Item
941

LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win – the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation for all c

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-23 19:30:18
    942

    Round Table Report 1 April 2015, Brussels Round Table Report The role of encryption in cloud computing for data privacy and security

    Add to Reading List

    Source URL: www.openforumeurope.org

    Language: English
      943

      Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA Abstract We de ne a new mode of operation for block encryption which in addition to

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2001-04-01 11:42:04
        944

        Practical Verifiable Encryption and Decryption of Discrete Logarithms∗ Jan Camenisch† Victor Shoup‡

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2003-08-25 08:08:04
          945

          Improving the trade-o between storage and communication in broadcast encryption schemes Ignacio Gracia, Sebasti a Mart n and Carles Padr o

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2001-10-26 11:45:45
            946

            WHITE PAPER, g10code GmbH, STEED — Usable End-to-End Encryption Werner Koch, Marcus Brinkmann

            Add to Reading List

            Source URL: www.g10code.de

            Language: English - Date: 2011-11-04 13:30:01
              947

              GreenNet CSIR Toolkit Briefing 3 Encryption and Digital Signatures GreenNet CSIR Toolkit Briefing no.3

              Add to Reading List

              Source URL: www.fraw.org.uk

              Language: English - Date: 2015-04-07 17:08:14
                948

                Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology Encrypting smartphones and other tech products will help protect against malicious hacking, identity

                Add to Reading List

                Source URL: d1ovv0c9tw0h0c.cloudfront.net

                Language: English - Date: 2014-11-10 17:17:00
                  949

                  Introduction Review of Identity Based Proxy Re-encryption Proposed in Pairing’07 Attacks Conclusions Acknowledgements

                  Add to Reading List

                  Source URL: grouper.ieee.org

                  Language: English - Date: 2009-06-26 15:24:13
                    950

                    Ciphertext-Policy Attribute-Based Encryption John Bethencourt Carnegie Mellon University Amit Sahai

                    Add to Reading List

                    Source URL: www.cyber-ta.org

                    Language: English - Date: 2007-03-24 01:06:06
                      UPDATE