Espionage

Results: 3893



#Item
531Visual cryptography / Cryptographic protocols / Key management / Digital photography / Image processing / Secret sharing / Pixel / Computing / Steganography / Cryptography / Computer graphics / Espionage

A Threshold Visual Cryptography Scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 11:45:43
532Side channel attack / Data Encryption Standard / Entropy / Correlation attack / RSA / Cryptanalysis / Cipher / Cryptography / Espionage / Power analysis

Improving the Rules of the DPA Contest Fran¸cois-Xavier Standaert⋆ , Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon UCL Crypto Group, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve. e-ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-08 08:57:29
533Security / Information security / Plaintext / Computer file / Computer virus / Steganographic file system / Steganalysis / Cryptography / Espionage / Steganography

Steganography The principle of steganographic methods of information protection is that a violator cannot distinguish meaningful information in the stream of data circulating in the system. Therefore, in this case no iss

Add to Reading List

Source URL: www.mttgroup.ch

Language: English - Date: 2015-01-14 11:58:03
534National Security Agency / Espionage / Mass surveillance / NSA warrantless surveillance controversy / Privacy of telecommunications / Roark / Federal Rules of Civil Procedure / Motion / Central Intelligence Agency / National security / Law / Government

Case 6:12-cvMC Document 110 Filed

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-04 15:48:35
535Espionage / National security / Security / Counterintelligence / Security clearance / Voice stress analysis / Lie detection / Polygraph / Pseudoscience

Here is the full text of the section of the NAS polygraph report referring to questionable polygraph research studies: BIAS, CONFLICT OF INTEREST, AND UNSCIENTIFIC DECISION MAKING In the course of our study we have seen

Add to Reading List

Source URL: cvsa1.com

Language: English - Date: 2010-11-01 10:48:00
536Cryptography / Finite fields / Steganography / Ciphertext indistinguishability / XTR / Information theory / Randomized algorithm / Theoretical computer science / Espionage / Applied mathematics

Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks Tri Van Le1 ∞

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-25 15:01:13
537Enigma machine / Operating Thetan / Stator / Reflector / Cyberwarfare / Rotor machines / Cryptography / Espionage

OTTICO MECCANICA ITALIANA CRYPTOGRAPH-WIRING; INFORMAL NO. 16

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-04-24 17:15:43
538Data security / Information sensitivity / Espionage / Classified information / Information security / Security clearance / Document / Classified information in the United States / Sensitive Security Information / Security / National security / United States government secrecy

NB: Unofficial translation, legally binding only in Finnish and Swedish Ministry of Justice, Finland Government Decree on information security in central government

Add to Reading List

Source URL: finlex.fi

Language: English
539National security / Computer network security / Cyberwarfare / Electronic commerce / Password / Information security / Scottrade / Spyware / Transaction authentication number / Security / Espionage / Crime prevention

We understand how important information security and privacy are to you. To provide you with greater peace of mind, we have developed the Scottrade Online Security Guarantee. If an unauthorized transaction is conducted o

Add to Reading List

Source URL: www.scottrade.com

Language: English - Date: 2013-05-16 18:54:16
540Secrecy / Espionage / United States Department of Energy / Security clearance / Information sensitivity / L clearance / Classified information / Central Intelligence Agency / Federal Bureau of Investigation / Security / United States government secrecy / National security

2014 Report on Security Clearance Determinations

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-04-24 09:52:01
UPDATE