<--- Back to Details
First PageDocument Content
Freedom of information legislation / Cryptography / Computer network security / National security / Freedom of Information Act / Commercial Product Assurance / Government Communications Headquarters / Passphrase / Security / Computer security / Evaluation
Date: 2012-02-09 12:16:48
Freedom of information legislation
Cryptography
Computer network security
National security
Freedom of Information Act
Commercial Product Assurance
Government Communications Headquarters
Passphrase
Security
Computer security
Evaluation

Software Encryption of Removable Media

Add to Reading List

Source URL: www.cesg.gov.uk

Download Document from Source Website

File Size: 312,25 KB

Share Document on Facebook

Similar Documents

Warnung: vertrauliche Daten! Es ist für die Sicherheit des Hauptschlüssels von Bedeutung, dass diese Passphrase nur dann in einem unsicheren System eingegeben wird, wenn der entsprechende Schlüssel verlängert werden

DocID: 1u4cS - View Document

Cryptography / Password / Salt / Key derivation function / Key stretching / Crypt / PBKDF2 / Rainbow table / Scrypt / Bcrypt / Passphrase / Password manager

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

DocID: 1rfah - View Document

Computer access control / Cryptography / Software / Password / Security / Cryptographic software / Random password generator / Passwd / Passphrase / Keeper / Crypt / KeePass

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

DocID: 1qXF3 - View Document

Cryptography / Computer access control / Obfuscation / Password / Passphrase / Random password generator / Diceware / Key / Password psychology / Password manager

Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect Tobias Seitz, Emanuel von Zezschwitz, Stefanie Meitner, Heinrich Hussmann Media Informatics Group LMU Munich Email: , em

DocID: 1qS26 - View Document

Cryptography / Passphrase / Obfuscation / Computer security / Crypt

Automatic Problem Generation for Capture-the-Flag Competitions Jonathan Burket Peter Chapman

DocID: 1qDNN - View Document