Encryption

Results: 4595



#Item
961

PRESS RELEASE Danish-developed dynamic encryption of your mobile communication Copenhagen, 24th October 2014 — DENCRYPT ApS today launches the DC1000 which effectively protects companies and public organisations’ mob

Add to Reading List

Source URL: www.dencrypt.dk

Language: English - Date: 2014-10-30 10:50:17
    962

      No Half Measures: Digital Marketing Properties Must Adopt Encryption Best Practices By Greg Norcie and Joseph Lorenzo Hall, Center for Democracy & Technology

    Add to Reading List

    Source URL: d1ovv0c9tw0h0c.cloudfront.net

    Language: English - Date: 2015-05-06 13:12:03
      963

      Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2001-12-17 07:56:45
        964

        LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win – the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation for all c

        Add to Reading List

        Source URL: nsrc.org

        Language: English - Date: 2015-02-23 19:28:37
          965

          KG-345 Type 1 Ethernet Encryptor Innovative government-grade encryption delivers the lowest cost of ownership, enhanced performance, and scalability for

          Add to Reading List

          Source URL: www.raytheon.com

          Language: English - Date: 2015-04-23 16:02:52
            966

            Wi-Fi settings for Android TUE-WPA2 2 The TUE-WPA2 network has WPA2 encryption. This network can be used by both TU/e students and TU/e employees. Wlan networkname: tue-wpa2

            Add to Reading List

            Source URL: w3.tue.nl

            Language: English - Date: 2013-11-06 08:03:11
              967

              BRICS Basic Research in Computer Science BRICS RS-00-5 Damg˚ard & Jurik: Efficient Protocols based on Probabilistic Encryption

              Add to Reading List

              Source URL: www.brics.dk

              Language: English - Date: 2000-03-10 05:29:11
                968

                Lower and Upper Bounds for Deniable Public-Key Encryption Rikke Bendlin 1,? , Jesper Buus Nielsen

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2011-09-13 08:16:55
                  969

                  The Perils of Unauthenticated Encryption: Kerberos Version 4∗ Tom Yu Sam Hartman Kenneth Raeburn Massachusetts Institute of Technology

                  Add to Reading List

                  Source URL: web.mit.edu

                  Language: English - Date: 2003-11-20 16:34:21
                    970

                    OVERVIEW OVERVIEW In today’s connected world, data is moving from private devices to the social cloud. Encryption is everywhere to protect the users’ privacy from prying

                    Add to Reading List

                    Source URL: www.hackingteam.com

                    Language: English - Date: 2013-09-17 08:27:50
                      UPDATE