Plaintext

Results: 367



#Item
171World Wide Web / Web 2.0 / IPhone software / Instagram / Facebook / Copyright law of the United States / Copyright / IOS / Access token / Computing / Software / Photo sharing

IOActive Security Advisory Title Facebook Access Token Sent in Plaintext Severity

Add to Reading List

Source URL: www.ioactive.com

Language: English
172Cyberwarfare / Substitution cipher / Cipher / Applied mathematics / Known-plaintext attack / Cryptanalysis / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Espionage

Bayesian Inference for Zodiac and Other Homophonic Ciphers Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2011-05-20 17:35:58
173National security / Data security / Computer network security / Information security / Identity theft / Privacy / Internet privacy / Plaintext / Personally identifiable information / Security / Computer security / Crime prevention

Notification Requirements for Confidential Information Breaches for Regional Center Vendors California law requires all government agencies to protect the privacy of confidential, sensitive, and/or personal information c

Add to Reading List

Source URL: www.farnorthernrc.org

Language: English - Date: 2013-11-01 12:21:08
174Information and Privacy Commissioner / Medical privacy / Internet privacy / Encryption / USB flash drive / Laptop / Plaintext / Information privacy / Ethics / Privacy / Cryptography

Stop. Think. Protect. Patient Privacy is in Your Hands. As health care practitioners, many of you are accustomed to dealing with loss. You interact with people every day who have lost their health, lost a loved one, or p

Add to Reading List

Source URL: www.hamiltonhealthsciences.ca

Language: English - Date: 2011-01-25 16:29:44
175Beds / Bedding / Babycare / Child safety / Infant bed / Mattress / Comforter / Known-plaintext attack / Pillow / Home / Furniture / Infancy

Injury prevention logo blk spot

Add to Reading List

Source URL: ctsafekids.org

Language: English - Date: 2012-01-03 09:52:46
176Beds / Bedding / Babycare / Child safety / Infant bed / Mattress / Comforter / Known-plaintext attack / Pillow / Home / Furniture / Infancy

Injury prevention logo blk spot

Add to Reading List

Source URL: ctsafekids.org

Language: English - Date: 2013-03-29 11:49:23
177Computer security / Data security / Ethics / Classified information / Information security / Non-disclosure agreement / Information privacy / Plaintext / Privacy / Security / National security / Information sensitivity

Information Protection Policy Version 1.1 st 21 June 2013

Add to Reading List

Source URL: iss.leeds.ac.uk

Language: English - Date: 2013-06-25 05:09:51
178Chosen-ciphertext attack / Ciphertext / RSA / Adaptive chosen-ciphertext attack / Advantage / Paillier cryptosystem / Affine cipher / Cryptography / Homomorphic encryption / Chosen-plaintext attack

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak,∗ Qiang Tang,† Alan T. Sherman,∗ Warren D. Smith,‡ Peter Ryan,† Kostas Kalpakis∗ April[removed]re

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 15:05:13
179Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
180Coding theory / Advanced Encryption Standard / Side channel attack / Block cipher / Ciphertext / Known-plaintext attack / Hamming weight / Cryptanalysis / Cube attack / Cryptography / Espionage / Cyberwarfare

Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song1,2 , Lei Hu1,2 , Siwei Sun1,2 , Zhang Zhang2 ,Danping Shi1,2 , Ronglin Hao1,3 1 State Key Laboratory of Information Security,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 04:34:57
UPDATE