End-to-end encryption

Results: 47



#Item
21Cryptography / Cipher / Encryption / Public-key cryptography / Ron Rivest / End-to-end auditable voting systems / Index of cryptography articles

Cryptographic Voting: A Tutorial Ben Adida 12 February 2005

Add to Reading List

Source URL: assets.adida.net

Language: English - Date: 2011-04-11 17:40:14
22

End-to-End Encryption in Cloud Services Patrick Linskey © 2011 Cisco and/or its affiliates. All rights reserved.

Add to Reading List

Source URL: gotocon.com

Language: English - Date: 2015-05-11 19:27:34
    23

    WHITE PAPER, g10code GmbH, STEED — Usable End-to-End Encryption Werner Koch, Marcus Brinkmann

    Add to Reading List

    Source URL: www.g10code.com

    - Date: 2011-11-04 13:30:01
      24

      Privacy Café How to use Signal – Private Messenger Signal – Private Messenger is a free and open source software application for iPhone that employs end-to-end encryption, allowing users to send end-to-end encrypted

      Add to Reading List

      Source URL: edri.org

      Language: English - Date: 2015-04-30 05:36:48
        25

        WHITE PAPER, g10code GmbH, STEED — Usable End-to-End Encryption Werner Koch, Marcus Brinkmann

        Add to Reading List

        Source URL: www.g10code.de

        Language: English - Date: 2011-11-04 13:30:01
          26

          Privacy Café How to use TextSecure on Android TextSecure is a messaging app that allows users to send secure messages with their mobile phone using end-to-end encryption. The app works over a Wi-Fi or data connection (3

          Add to Reading List

          Source URL: edri.org

          Language: English - Date: 2015-04-30 05:36:45
            27

            CASE STUDY BevMo! Goes Secure with End-to-End Encryption from Tns, Powered By VeriFone’s VeriShield Protect

            Add to Reading List

            Source URL: www.tnsi.com

            Language: English - Date: 2011-03-23 07:52:22
              28Computing / Computer security / Cryptographic software / Privacy of telecommunications / Email privacy / Email encryption / Encryption / Privacy / Pretty Good Privacy / Internet privacy / Email / Cryptography

              CHAPTER to put PGP on the Internet for use in the U.S., and in conformance with export controls. By the end of the decade, the

              Add to Reading List

              Source URL: inst.eecs.berkeley.edu

              Language: English - Date: 2012-03-17 16:37:44
              29Telecommunications engineering / Terrestrial Trunked Radio / End-to-end encryption / Channel / Telecommunication / Trunking / UHF CB / Project 25 / Radio / Trunked radio systems / Technology

              PDF Document

              Add to Reading List

              Source URL: www.tetrapol.com

              Language: English - Date: 2012-01-18 07:44:27
              30Videotelephony / Skype / Skype protocol / Network protocols / File sharing networks / NetBIOS / Peer-to-peer / Transmission Control Protocol / Secure Shell / Software / Computing / Voice over IP

              Protocol Identification via Statistical Analysis (PISA) Black Hat 2007 Rohit Dhamankar and Rob King, TippingPoint Technologies Abstract A growing number of proprietary protocols are using end-to-end encryption to avoid

              Add to Reading List

              Source URL: www.blackhat.com

              Language: English - Date: 2014-12-16 19:06:37
              UPDATE