<--- Back to Details
First PageDocument Content
Computing / Cryptographic software / USB flash drive / DataLock Technology / Encryption / Universal Serial Bus / USB 3.0 / Non-volatile memory / IronKey / Disk encryption / Computer hardware / USB
Date: 2013-11-11 08:41:20
Computing
Cryptographic software
USB flash drive
DataLock Technology
Encryption
Universal Serial Bus
USB 3.0
Non-volatile memory
IronKey
Disk encryption
Computer hardware
USB

datashur_datasheet_pg1111 copy

Add to Reading List

Source URL: www.istorage-uk.com

Download Document from Source Website

File Size: 482,49 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Cryptographic software / Disk encryption / Secure communication / Transport Layer Security / Galois/Counter Mode / CCM mode / Cipher suite

Microsoft Word - Encryption_Documentation_for_Beekeeper_Product_and_Services.docx

DocID: 1xVZT - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cryptographic software / Public key infrastructure / ID-based encryption / Encryption / Key / Identity-based conditional proxy re-encryption / Deniable encryption

April 17, 2018 An Introduction to Attribute-Based Encryption Attribute Based Encryption Encryption is a method of encoding data that protects the confidentiality of its contents from unauthorized attackers. Traditionall

DocID: 1xVLe - View Document

Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

DocID: 1xVxZ - View Document

Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

DocID: 1xVie - View Document

Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

DocID: 1xV7Y - View Document