Secure communication

Results: 3134



#Item
381Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
382Cryptographic protocols / Internet standards / Secure communication / Keystore / HTTP Secure / X.509 / Self-signed certificate / Public key certificate / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Lexmark International Markvision Enterprise SSL Configuration White Paper June 2015

Add to Reading List

Source URL: www.lexmark.com

Language: English - Date: 2015-07-17 20:29:14
383Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2010-11-25 08:58:28
384Learning / Narratology / Rhetoric / Presentation / Södertörn University / Assa Abloy / Argumentation theory / Lecture / Royal Institute of Technology / Critical thinking / Human communication / Education

Presentations and argumentations This lecture gives participants knowledge, tools, and support in the field of presentation skills and argumentation. The ultimate goal is to enable participants to feel secure when they g

Add to Reading List

Source URL: www.metalund.lu.se

Language: English - Date: 2015-05-05 08:13:56
385Technology / Hacking / Computer network security / Computer security / Secure communication / SCADA / Vulnerability / Automation / Security testing / Software testing / Cyberwarfare / Security

Emerson Process Management Integrates Achilles Testing June 15, 2009 Wurldtech Announces The Latest Equipment Manufacturer To Select The Award-Winning Achilles Security & Robustness Testing Platform Demonstrating Continu

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
386Crime prevention / Electronic commerce / National security / Secure communication / TSF / Kuala Lumpur / Government / Public safety / Security / Computer network security / Computer security

Security Domain Separation as Prerequisite for Business Flexibility

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2011-09-21 17:05:00
387

– Secure communications over untrusted IP-networks Färist VPN provides secure communication over untrusted IP-networks making it possible to interconnect private

Add to Reading List

Source URL: www.tutus.se

Language: English - Date: 2015-05-12 16:15:54
    388

    PRESSE RELEASE Dencrypt wins Danish Armed Forces contract for secure mobile communication Copenhagen, 15 January 2015: The Danish Armed Forces has placed an order for Dencrypt’s DC1000 solution for secure mobile commun

    Add to Reading List

    Source URL: www.dencrypt.dk

    Language: English - Date: 2015-01-14 15:38:10
      389

      CASE STUDY Banca di Credito Cooperativo Alta Padovana Transaction Network Services (TNS) is one of the leading providers of fast, secure and cost effective data communication services for transaction-oriented applicatio

      Add to Reading List

      Source URL: www.tnsi.com

      Language: English
        390

        Dialogue, Implementation and Network How do we make things happen? Our aim is to secure the internal as well as the external communication in the project. We also want to ensure that external parties with significance fo

        Add to Reading List

        Source URL: www.stringcorridor.org

        Language: English - Date: 2012-10-02 06:01:58
          UPDATE