End-to-end encryption

Results: 47



#Item
31Schaumburg /  Illinois / Terrestrial Trunked Radio / Dimetra / Motorola / Two-way radio / 3GPP Long Term Evolution / LTE Advanced / End-to-end encryption / Wireless / Technology / Mobile technology / Trunked radio systems

MOTOROLA TETRA SOLUTIONS SAFER CITIES. THRIVING COMMUNITIES. BENEFIT FROM A

Add to Reading List

Source URL: www.motorolasolutions.com

Language: English - Date: 2015-04-11 13:45:59
32Internet / Email / Public-key cryptography / Cloud clients / Smartphones / Email encryption / Android Privacy Guard / Android / Web of trust / Cryptography / Computing / Internet privacy

Free privacy tools for Android phones and tablets TextSecure Private Text and Chat This is a replacement for the standard SMS messaging app and provides support for end-to-end encryption of text messages. The TextSecure

Add to Reading List

Source URL: sheffield.openrightsgroup.org

Language: English - Date: 2014-11-13 14:50:53
33Computer-mediated communication / Public-key cryptography / Internet privacy / Key management / S/MIME / Email client / IMail / Pretty Good Privacy / Gmail / Cryptography / Email / Computing

Challenges with End-to-End Email Encryption Jiangshan Yu, Vincent Cheval, and Mark Ryan School of Computer Science, University of Birmingham, UK 1

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
34Computer-mediated communication / Sectéra Secure Module / Cisco Unified Communications Manager / Voice over IP / Skinny Call Control Protocol / Avaya Application Server / Cisco IOS / Session Initiation Protocol / Avaya / Videotelephony / Electronic engineering / Electronics

TalkSECURE™ vIPer™ Universal Secure Phone Overview The TalkSECURE™ vIPer™ phone provides the latest technology for secure, end-to-end Voice over IP and analog (PSTN) networks, using AES (Advanced Encryption Stand

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-02 04:06:35
35United States government secrecy / Cryptography / Synchronous optical networking / TACLANE / Optical Carrier transmission rates / High Assurance Internet Protocol Encryptor / National Security Agency / Computer network / Communications security / Espionage / Cyberwarfare / Cryptographic protocols

KG-530 Encryptor Next Generation SONET High-Speed Encryption Overview The KG-530 is the next generation encryptor for high-speed applications. KG-530 provides end-to-end, low latency security for SONET networks at 40 Gb/

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-02 04:06:47
36Law enforcement in the United Kingdom / Airwave / Trunked radio systems / Terrestrial Trunked Radio / Dimetra / End-to-end encryption / Motorola / Professional mobile radio / Telefónica Europe / Technology / Mobile technology / Public safety

CASE STUDY: Airwave: one network, one technology, one truly open standard The UK’s Airwave network is one of the largest

Add to Reading List

Source URL: www.tandcca.com

Language: English
37Transport / End-to-end encryption / Mobile technology / EADS / TETRAPOL / Trunked radio systems / Technology / Terrestrial Trunked Radio

DocHdl1OnLIBRISPRtmpTarget

Add to Reading List

Source URL: www.tandcca.com

Language: English
38Technology / Science / Key management / Cryptography / Terrestrial Trunked Radio / End-to-end encryption

TETRA Association Security and Fraud Prevention Group Information document

Add to Reading List

Source URL: www.tandcca.com

Language: English
39Computing / Internet privacy / Electronic documents / Privacy of telecommunications / Secure messaging / IMail / Email / Internet / Computer-mediated communication

Secure Email CryptoHeaven is the premier provider of secure email hosting and encrypted email hosting. Our automatic and transparent encryption ensures end-to-end security that is unmatched in the industry. With CryptoHe

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-04 10:32:36
40

INMARSAT 4 ■ B  GAN REACHBACK TO CENTRAL Command/CONTROL End-to-end IP encryption

Add to Reading List

Source URL: rf.harris.com

- Date: 2014-07-24 09:38:53
    UPDATE