End-to-end encryption

Results: 47



#Item
1Cryptography / Computing / Information and communications technology / Security engineering / Cloud applications / Cloud infrastructure / Data security / AXA / CAC 40 / Software as a service / Vera Security / End-to-end encryption

PRESS RELEASE PARIS, September 14th 2017 AXA Strategic Ventures invests in an end-to-end encryption solution for securing cloud-hosted data. AXA Strategic Ventures (ASV) announces today it has participated with Idinvest,

Add to Reading List

Source URL: www.axavp.com

Language: English - Date: 2018-04-06 05:43:52
2

Highest level of cloud security for your business Tresorit’s End-to-End Encryption Technology Offers a New Level of Security for Cloud-Based File Collaboration and Sharing

Add to Reading List

Source URL: az579219.vo.msecnd.net

Language: English - Date: 2017-08-23 03:52:51
    3

    Scaling Bitcoin MilanPeer-to-Peer Encryption and Authentication from the Perspective of End-Users _jonasschnelli_

    Add to Reading List

    Source URL: milan2016.scalingbitcoin.org

    Language: English - Date: 2016-10-09 05:12:04
      4Cryptography / Computer security / Computer access control / Key management / Password / Security / Cryptographic software / Key / Crypt / Salt / Password strength / Password manager

      [git] • Branch: master @ b975c85 • Release: v0) Head tags: v0.2.6 Key Security Features 1Password offers a number of notable security features, including True end-to-end encryption All cryptographic

      Add to Reading List

      Source URL: 1password.com

      Language: English - Date: 2018-08-14 16:56:29
      5

      Response to nVisium Audit We enlisted the independent security firm nVisium to audit the design and architecture of the new End-to-End Encryption feature of Day One. We were pleased with the professionalism and thoroughn

      Add to Reading List

      Source URL: dayoneapp.com

      - Date: 2017-06-27 17:01:45
        6

        [git] • Branch: master @ 88d0df1 • Release: v0) Head tags: v0.2.3 Key Security Features 1Password for Teams offers a number of notable security features, including True end-to-end encryption All cryp

        Add to Reading List

        Source URL: 1password.com

        - Date: 2016-12-15 17:09:29
          7Software / Cryptography / Signal / Encryption / Cipher / Facebook Messenger / Key / Public-key cryptography / RSA / Initialization vector / End-to-end encryption / Text messaging

          CMYK / .eps Facebook “f ” Logo CMYK / .eps

          Add to Reading List

          Source URL: fbnewsroomus.files.wordpress.com

          Language: English - Date: 2016-07-08 12:43:14
          8Cryptography / End-to-end encryption / Computing / Cloud storage / Cloud computing / Online backup services / Cloud computing security / Centralized computing / Deterministic encryption

          Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs

          Add to Reading List

          Source URL: paul.rutgers.edu

          Language: English - Date: 2015-10-27 14:52:24
          9Cryptography / Crime prevention / National security / Encryption / Computer security / Internet privacy / National Security Agency / End-to-end encryption / Surveillance / Crypto Wars / Export of cryptography from the United States

          PDF Document

          Add to Reading List

          Source URL: homeland.house.gov

          Language: English - Date: 2016-07-05 08:45:24
          10Password / Security / Disk encryption / Login / Password manager / Security and safety features new to Windows Vista

          Drive Encryption Procedure End User Documentation: First Time Login (Revision Date: Table of Contents

          Add to Reading List

          Source URL: supportcenter.ct.edu

          Language: English - Date: 2014-05-16 15:09:57
          UPDATE