Encryption

Results: 4595



#Item
951

Privacy Café How to use TextSecure on Android TextSecure is a messaging app that allows users to send secure messages with their mobile phone using end-to-end encryption. The app works over a Wi-Fi or data connection (3

Add to Reading List

Source URL: edri.org

Language: English - Date: 2015-04-30 05:36:45
    952

    The Perils of Unauthenticated Encryption: Kerberos Version 4 Tom Yu Sam Hartman Ken Raeburn

    Add to Reading List

    Source URL: web.mit.edu

    Language: English - Date: 2004-02-06 20:59:49
      953

      Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage∗ Giuseppe Ateniese† Kevin Fu‡

      Add to Reading List

      Source URL: spar.isi.jhu.edu

      Language: English - Date: 2005-02-04 17:13:07
        954

        More Attacks on Cryptography MS Point-to-Point Encryption (MPPE) If both endpoints support 128-bit crypto:

        Add to Reading List

        Source URL: www-inst.eecs.berkeley.edu

        Language: English - Date: 2010-03-13 01:29:42
          955

          WiPort NR Embedded Ethernet Device Server Proven operating system, embedded web server complete network protocol stack 256-bit AES encryption for secure communications

          Add to Reading List

          Source URL: www.lantronix.com

          Language: English - Date: 2014-03-07 17:49:27
            956

            File encryption using OpenSSL and GnuPG

            Add to Reading List

            Source URL: nsrc.org

            Language: English - Date: 2013-08-13 07:21:57
              957

              Space-Efficient Identity Based Encryption Without Pairings∗ Dan Boneh† Craig Gentry‡ Michael Hamburg

              Add to Reading List

              Source URL: crypto.stanford.edu

              Language: English - Date: 2010-06-04 16:24:15
                958

                Supporting Document Mandatory Technical Document Full Drive Encryption: Authorization Acquisition January 2015

                Add to Reading List

                Source URL: www.commoncriteriaportal.org

                Language: English - Date: 2015-02-27 15:31:27
                  959

                  Rudy Hartono Senior Security Architect, SecureAge Technology Mr Rudy Hartono specializes in developing email security, file-system based encryption and network security solutions for SecureAge Technology. He holds a Bach

                  Add to Reading List

                  Source URL: www.informationsecurityasia.com

                  - Date: 2011-07-15 00:57:22
                    960

                    Lest We Remember: Cold Boot Attacks on Encryption Keys

                    Add to Reading List

                    Source URL: www.usenix.org

                    Language: English - Date: 2008-07-14 18:19:28
                      UPDATE