Pretty Good Privacy

Results: 181



#Item
31

Universitätsrechenzentrum Manuela Jürgens Abt. Wissenschaftliche Anwendungen Pretty Good Privacy

Add to Reading List

Source URL: www.netzmafia.de

Language: German - Date: 2002-01-25 09:51:16
    32Public-key cryptography / PGP / Key server / Email encryption / Usability / Pretty Good Privacy / Cypherpunk anonymous remailer / Cryptography / Internet privacy / Email

    Class Notes: February 2, 2006 Topic: User Testing II Lecturer: Jeremy Hyland Scribe: Rachel Shipman Why Can’t Johnny Encrypt? A Usability Evaluation of PGP 5.0

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2006-02-05 15:18:00
    33Computing / Cryptographic software / Internet privacy / Pretty Good Privacy / Encryption / USB flash drive / Vormetric / Disk encryption hardware / Cryptography / Computer security / Disk encryption

    Nine Questions Encryption Vendors Really Don’t Want to Answer A B U Y E R ’ S G U I D E T O E N T E R P R I S E D ATA E N C R Y P T I O N

    Add to Reading List

    Source URL: download.pgp.com

    Language: English - Date: 2008-07-14 18:03:42
    34Chosen-ciphertext attack / Pretty Good Privacy / Initialization vector / Encryption / Known-plaintext attack / Block cipher / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext

    Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    35Public-key cryptography / Internet privacy / Alice and Bob / Simple Mail Transfer Protocol / Oblivious transfer / Pretty Good Privacy / Needham–Schroeder protocol / Index of cryptography articles / Cryptography / Email / Cryptographic protocols

    A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    36PGP / Public-key cryptography / Privacy software / Cipher / Key / Symmetric-key algorithm / GNU Privacy Guard / Pretty Good Privacy / S/MIME / Cryptography / Cryptographic software / Computer security

    On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJUnited States of America Website: http://www.on-core.com Technical Support:

    Add to Reading List

    Source URL: www.on-core.com

    Language: English - Date: 2015-03-30 11:01:16
    37Cryptographic protocols / Notary / Digital signature / X.509 / Public key certificate / Pretty Good Privacy / Certificate authority / Electronic signature / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

    Signatures: an Interface between Law and Technology Ben Laurie Nicholas Bohm

    Add to Reading List

    Source URL: apache-ssl.securehost.com

    Language: English - Date: 2006-10-26 22:06:14
    38Email / Internet standards / Internet privacy / Public-key cryptography / S/MIME / Email encryption / Transport Layer Security / Pretty Good Privacy / Email client / Computing / Internet / Cryptography

    BizTech home | about | subscribe to digital edition | partner advertising | back issues | feedback | contact login | register [ ROI [ wireless [ finance [ IT investment [ profiles [ security [ networking [ telecommuting

    Add to Reading List

    Source URL: www.dslextreme.com

    Language: English - Date: 2012-06-09 03:29:38
    39Cross-platform software / PostgreSQL / SQL keywords / Relational database management systems / SQL / Null / Universally unique identifier / Metaphone / Pretty Good Privacy / Computing / Software / Technical communication

    PostgreSQL Reference Manual Volume 6: Additional Resources for versionSeptemberThe PostgreSQL Global Development Group

    Add to Reading List

    Source URL: www.network-theory.co.uk

    Language: English - Date: 2011-12-13 17:21:17
    40Email / Public-key cryptography / Internet standards / Internet privacy / Encryption / Transport Layer Security / Export of cryptography in the United States / Pretty Good Privacy / Cryptography / Internet / Computing

    Encryption from a Human Rights Perspective The right to privacy as stated in Art. 12 UDHR not only protects against arbitrary interference with correspondence but also entitles to protection by law against such interfere

    Add to Reading List

    Source URL: www.ohchr.org

    Language: English - Date: 2015-03-16 11:04:20
    UPDATE