Plaintext

Results: 367



#Item
221Cryptographic software / Data security / Disk encryption / Information security / National security / Encryption / USB flash drive / Plaintext / Encrypting File System / Cryptography / Security / Computer security

The City of New York CITYWIDE INFORMATION SECURITY POLICY Encryption Policy The Policy All City of New York data with a data classification of private or confidential may not be stored

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2014-09-09 15:27:10
222Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:07
223Beds / Bedding / Babycare / Child safety / Infant bed / Mattress / Comforter / Known-plaintext attack / Pillow / Home / Furniture / Infancy

Injury prevention logo blk spot

Add to Reading List

Source URL: www.ctsafekids.org

Language: English - Date: 2012-01-03 09:52:46
224Child safety / Infancy / Infant bed / Known-plaintext attack / U.S. Consumer Product Safety Commission / Regulatory compliance / Consumer Product Safety Act / Family / Law / Consumer Product Safety Commission / Consumer protection law / Beds

STATE OF TENNESSEE DEPARTMENT OF HUMAN SERVICES CITIZENS PLAZA BUILDING 400 DEADERICK STREET NASHVILLE, TENNESSEE[removed]

Add to Reading List

Source URL: www.tn.gov

Language: English - Date: 2013-01-08 14:22:22
225Data security / Data management / Grammar / Human communication / Question / Personal computer / Data remanence / Computer / Plaintext / Information / Computer storage / Technology

PCCD Q&A – March Compu-rep Meeting Question: To whom will the Cherwell system send the order and delivery notifications x

Add to Reading List

Source URL: www.umanitoba.ca

Language: English - Date: 2014-07-22 12:10:30
226Cryptography / Microsoft Windows / Security / Laptop theft / Encryption / Plaintext / USB flash drive / Password / Information security / Disk encryption / Cryptographic software / Computing

PDF Document

Add to Reading List

Source URL: sourcebook.od.nih.gov

Language: English - Date: 2008-04-10 07:54:33
227Substitution cipher / Ciphertext / Cipher / Known-plaintext attack / Unicity distance / Information theory / Cryptanalysis / Vigenère cipher / Affine cipher / Cryptography / Formal sciences / Science

Attacking Decipherment Problems Optimally with Low-Order N-gram Models Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2010-06-14 16:48:29
228Ciphertext / RSA / Cipher / CBC-MAC / Known-plaintext attack / Cryptography / SCADA / Block cipher modes of operation

Low-Latency Cryptographic Protection for SCADA Communications Andrew K. Wright1 , John A. Kinast2 , and Joe McCarty2 1 2

Add to Reading List

Source URL: scadasafe.sourceforge.net

Language: English - Date: 2004-04-16 10:47:58
229Cyberwarfare / Substitution cipher / Cipher / Applied mathematics / Known-plaintext attack / Cryptanalysis / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Espionage

Bayesian Inference for Zodiac and Other Homophonic Ciphers Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: aclweb.org

Language: English - Date: 2011-05-20 17:35:58
230Multilingualism / Known-plaintext attack / Language / Language acquisition / Etymologies / Orange

Margot Downs WIDA Certified Consultant “Understanding Academic Language” December 13, 2010

Add to Reading List

Source URL: www.maine.gov

Language: English - Date: 2010-12-20 15:25:08
UPDATE