End-to-end encryption

Results: 47



#Item
11White Paper  Cisco Spark Security and Privacy Version 1.0 (JuneCisco® Spark is a cloud collaboration platform that provides messaging, calling, and

White Paper Cisco Spark Security and Privacy Version 1.0 (JuneCisco® Spark is a cloud collaboration platform that provides messaging, calling, and

Add to Reading List

Source URL: www.cisco.com

Language: English
12Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad  Alptekin Küpçü

Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad Alptekin Küpçü

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
13ETS Corporation Software Developer / Jr. DBA $80k – $100k/year Full Time Professional Position Headquartered in Sterling, Virginia. Duties Design and develop end-to-end encryption payment system that can be integrated

ETS Corporation Software Developer / Jr. DBA $80k – $100k/year Full Time Professional Position Headquartered in Sterling, Virginia. Duties Design and develop end-to-end encryption payment system that can be integrated

Add to Reading List

Source URL: www.etsms.com

Language: English - Date: 2014-07-28 11:44:31
    14Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

    Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

    Add to Reading List

    Source URL: isi.jhu.edu

    Language: English - Date: 2016-03-21 17:23:50
    15WhatsApp Encryption Overview Technical white paper April 4, 2016

    WhatsApp Encryption Overview Technical white paper April 4, 2016

    Add to Reading List

    Source URL: www.whatsapp.com

    Language: English
    16[git] • Branch: master @ 88d0df1 • Release: v0) Head tags: v0.2.3 Key Security Features 1Password for Teams offers a number of notable security features, including True end-to-end encryption All cryp

    [git] • Branch: master @ 88d0df1 • Release: v0) Head tags: v0.2.3 Key Security Features 1Password for Teams offers a number of notable security features, including True end-to-end encryption All cryp

    Add to Reading List

    Source URL: www.1password.com

    Language: English - Date: 2016-04-13 14:05:22
      17Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

      Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

      Add to Reading List

      Source URL: cyber.law.harvard.edu

      Language: English - Date: 2016-01-31 21:23:48
      18BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Ahmet Talha Ozcan1 , Can Gemicioglu2 , Kaan Onarlioglu3 , Michael Weissbacher3 , Collin Mulliner3 , William Robertson3 , and Engin Kirda3 1

      BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Ahmet Talha Ozcan1 , Can Gemicioglu2 , Kaan Onarlioglu3 , Michael Weissbacher3 , Collin Mulliner3 , William Robertson3 , and Engin Kirda3 1

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:32:53
      19Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

      Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

      Add to Reading List

      Source URL: conferences.sigcomm.org

      Language: English - Date: 2015-07-29 16:55:02
      20Wireless networking / Technology / Computing / IEEE 802.11 / Wi-Fi / Encryption / Public-key cryptography / Bluetooth / Wireless

      Proposal for EU legislation Mandatory anonymised, authenticated and end-to-end encrypted communications in all tele­pho­ny and computing devices sold after 201x. Status: DRAFT 0.13

      Add to Reading List

      Source URL: youbroketheinternet.org

      Language: English - Date: 2015-09-29 18:17:30