Messaging Security

Results: 466



#Item
301Cryptographic protocols / Cryptographic software / FIPS 140-2 / Key / Block cipher / Security and safety features new to Windows Vista / Microsoft CryptoAPI / Cryptography / Key management / Public-key cryptography

Security Policy for Motorola Messaging Server and Motorola MyMail Desktop Plus Encryption DLL Cryptographic Module

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
302Internet / Spamming / Password / Phishing / Online shopping / Identity theft / Email / Instant messaging / Mobile banking / Computing / Technology / Electronic commerce

fort_mac_online_security_tips.ppt

Add to Reading List

Source URL: www.fortmac.org

Language: English - Date: 2013-04-19 11:23:20
303Presidency of Barack Obama / Sheldon Whitehouse / Barack Obama / United States Senate / Presidents of the United Nations Security Council / United States / Government

2012–2013 GSA-USGS Congressional Science Fellow Report amendments of their own, and watching the Senate floor to help our bosses keep the budget-messaging in line with their politics. This was a late and fun night, and

Add to Reading List

Source URL: www.geosociety.org

Language: English - Date: 2013-06-28 12:22:25
304Electronics / Mobile telecommunications / Smartphones / Text messaging / Mobile phone / Internet privacy / Mobile device / Malware / Mobile business intelligence / Technology / Information appliances / Mobile technology

Cyber Security Consumer Tip Sheet Mobile Devices As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet

Add to Reading List

Source URL: cira.ca

Language: English - Date: 2013-01-08 14:32:24
305Malware / Mobile security / Internet privacy / Mobile technology / Wireless / Mobile telecommunications / Mobile business intelligence / Mobile virus / Technology / Online chat / Text messaging

Safety Tips for Mobile Devices Mobile devices can perform a variety of tasks: take pictures, send text messages, surf the Web, and store information. Today’s mobile devices are as powerful and connected as any PC or la

Add to Reading List

Source URL: itsecurity.cuyahogacounty.us

Language: English - Date: 2014-08-07 15:43:08
306Secure communication / Cryptographic protocols / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Yale University Department of Computer Science Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs David Isaac Wolinsky

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-28 11:34:07
307Notification system / Management / Text messaging / Emergency / Security / Public safety / Emergency management / Human–computer interaction

General/Student Policy - Emergency Notification Purpose: The safety of students and employees is a top priority of Bismarck State College. BSC has implemented emergency notification systems to allow the campus to contact

Add to Reading List

Source URL: www.bismarckstate.edu

Language: English - Date: 2013-05-29 13:29:43
308Email / Internet standards / Online chat / Cryptographic protocols / Secure messaging / Transport Layer Security / Public key infrastructure / Two-factor authentication / Instant messaging / Cryptography / Computing / Public-key cryptography

On Securing the Public Health Information Network Messaging System

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-03-07 13:17:14
309Secure communication / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs, David Isaac Wolinsky, and Bryan Ford Yale University Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-26 19:19:46
310Cryptographic protocols / Internet privacy / Email authentication / Public key infrastructure / X.509 / Secure messaging / S/MIME / Public key certificate / XKMS / Cryptography / Public-key cryptography / Key management

Improving Message Security With a Self-Assembling PKI Jon Callas Chief Technical and Security Officer 28 April 2003

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 12:04:46
UPDATE