Key generation

Results: 481



#Item
161Telenor / Pitney Bowes / Invoice / Customer relationship management / Business / Marketing / Grameenphone

CUSTOMER COMMUNICATION MANAGEMENT Grameenphone Integrates Key Technology: Group 1 Software Enhances Flexible Invoice Generation System

Add to Reading List

Source URL: www.pitneybowes.com

Language: English - Date: 2015-01-17 08:27:21
162Data / Email / Anonymity / Public-key cryptography / Attribution / Communications protocol / Authentication / Internet privacy / Journalism sourcing / Computing / Social psychology / Information

Attribution Requirements for the Next Generation Internet Jeffrey Hunker Carrie Gates Matt Bishop

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-08-09 18:09:40
163Embedded system / Physical Unclonable Function / Trusted Computing / Key generation / Cyberwarfare / Computer security / Electronic engineering / SiliconBlue Technologies / Secure cryptoprocessor / Cryptography / Key management / Field-programmable gate array

1 Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-09 15:36:30
164Key management / Key size / Encryption / Key generation / Vormetric / Encrypting File System / Cryptography / Disk encryption / Cryptographic software

Data Sheet SPHiNX Data Encryption Suite Highlights • Protects data from unauthorized access

Add to Reading List

Source URL: www.crossroads.com

Language: English - Date: 2013-05-08 15:27:00
165Earth / Air pollution / Electric power / Emissions & Generation Resource Integrated Database / Energy in the United States / Renewable energy / Greenhouse gas emissions by the United States / American Clean Energy and Security Act / Environment / Climate change policy / Low-carbon economy

Contact: Stacy Tellinghuisen (Colorado), ([removed]Steve Michel (New Mexico, Nevada), ([removed]Bob Johnston (Nevada), ([removed]Key Western States Are Well-Positioned

Add to Reading List

Source URL: westernresourceadvocates.org

Language: English - Date: 2014-07-29 13:42:29
166Advanced Encryption Standard / Committees / Consultative Committee for Space Data Systems / Key size / Symmetric-key algorithm / Triple DES / Key generation / International Data Encryption Algorithm / Cryptography / Key management / Data Encryption Standard

Report Concerning Space Data System Standards ENCRYPTION ALGORITHM TRADE SURVEY INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2008-04-01 13:43:14
167Cryptographic software / PGP / Passphrase / Key generation / X.509 / Key / Digital signature / Session key / Crypt / Cryptography / Key management / Public-key cryptography

Authora Inc[removed]removed] http://www.authora.com COPYRIGHT © [removed]AUTHORA INC. ALL RIGHTS RESERVED. NO PART OF THIS PUBLICATION MAY BE REPRODUCED,

Add to Reading List

Source URL: www.authora.com

Language: English - Date: 2013-03-28 16:03:22
168Pseudorandom number generators / Mathematics / Theoretical computer science / Pseudorandomness / Random number generation / Entropy / Fortuna / Key / Microphone / Cryptography / Randomness / Applied mathematics

Generation of Pseudorandom Numbers From Microphone Input in Computing Devices A Thesis In TCC 402

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-04-28 15:57:16
169Metadata / Trusted computing / Trusted computing base / XrML / Next-Generation Secure Computing Base / ODRL / PlayReady / The Right to Read / Trusted Platform Module / Computer security / Digital rights management / Copyright law

Key Challenges in DRM: An Industry Perspective Brian A. LaMacchia? Microsoft Corporation One Microsoft Way Redmond, WA[removed]USA

Add to Reading List

Source URL: www.farcaster.com

Language: English - Date: 2008-08-19 02:49:34
170Malware / Network security / Evasion / Cyberwarfare / Antivirus software / Computing / Computer network security / McAfee / Computer security / Companies listed on the New York Stock Exchange

Data Sheet Key Advantages Unparalleled threat prevention ■■ Next-generation

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-02 14:19:25
UPDATE