Encryption

Results: 4595



#Item
971

Participating With Safety 4 Using Encryption and Digital Signatures Participating With Safety Briefing no. 4 Using Encryption and Digital Signatures

Add to Reading List

Source URL: www.fraw.org.uk

Language: English - Date: 2015-04-07 17:06:50
    972

    キーリカバリ、キーエスクロウ、第三者信託方式による 暗号のリスク 1998 年増補版 ( The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption, 1998 Edition

    Add to Reading List

    Source URL: cruel.org

    Language: Japanese - Date: 2013-03-19 20:28:03
      973

      Introduction wPRFs Encryption from wPRFs

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2007-06-12 08:54:23
        974

        Lotus Notes Integration Lotus Notes ID files and passwords use a complicated combination of encryption and data replication. This complexity makes Lotus Notes

        Add to Reading List

        Source URL: hitachi-id.com

        Language: English - Date: 2012-01-03 15:22:47
          975

          A Java implemented key collision attack on the Data Encryption Standard (DES) John Loughran Tom Dowling

          Add to Reading List

          Source URL: homepage.eircom.net

          Language: English - Date: 2003-06-15 20:48:36
            976

            Testimony of Daniel F. Conley Suffolk County District Attorney Massachusetts Encryption Technology and Potential U.S. Policy Responses Committee on Oversight and Government Reform

            Add to Reading List

            Source URL: s3.amazonaws.com

            Language: English - Date: 2015-04-29 12:58:09
              977

              CASE STUDY BevMo! Goes Secure with End-to-End Encryption from Tns, Powered By VeriFone’s VeriShield Protect

              Add to Reading List

              Source URL: www.tnsi.com

              Language: English - Date: 2011-03-23 07:52:22
                978

                Dynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign Abstract—Dynamic Searchable Symmetric Encryption allows a client to store a

                Add to Reading List

                Source URL: ieee-security.org

                Language: English - Date: 2014-04-21 13:48:10
                  979Tree / Broadcast encryption / Model theory / Cryptography / Set theory / Public-key cryptography

                  Graceful Service Degradation (or, How to Know your Payment is Late) ∗ Alexandr Andoni MIT

                  Add to Reading List

                  Source URL: www.mit.edu

                  Language: English - Date: 2005-06-07 15:30:07
                  980Security / Email authentication / Cryptographic software / Secure communication / Clipper chip / Disk encryption / National Security Agency / Pretty Good Privacy / Email encryption / Cryptography / Internet privacy / Computer security

                  Bankston_short_biographical_summary

                  Add to Reading List

                  Source URL: static.newamerica.org

                  Language: English - Date: 2015-05-04 13:25:41
                  UPDATE