Secure communication

Results: 3134



#Item
671Free software licenses / Data / Implied warranty / Copyright law of the United States / Cryptography / Warranty / Copyright / Public-key cryptography / XCore Open Source License / Contract law / Law / Science

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:18:16
672Science / Data / Free software licenses / Implied warranty / Copyright law of the United States / Warranty / Copyright / Public-key cryptography / Cipher / Contract law / Law / Cryptography

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:18:52
673Science / Mathematical sciences / Cyberwarfare / Index of cryptography articles / One-time pad / Cryptography / Cipher / Symmetric-key algorithm

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:02
674Key size / Message authentication code / Block cipher / Cryptographic hash function / Cryptography / Symmetric-key algorithm / Cipher

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
675Public-key cryptography / Email authentication / Email / S/MIME / Public key infrastructure / Secure communication / Email client / Secure messaging / Cryptography / Computing / Internet privacy

Totemo TrustMail® Overview Totemo TrustMail® is a complete, standards-based encryption solution that runs on Sentrion, supporting S/MIME and OpenPGP. It provides an Internal Encryption option that simplifies management

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2012-04-04 15:31:26
676Computing / Data / Internet standards / Secure communication / Public-key cryptography / Transport Layer Security / X.509 / TLS-PSK / Public key certificate / Cryptographic protocols / Cryptography / Internet protocols

This Specification is provided for future development work within oneM2M only. The Partners accept no liability for any use of this Specification. The present document has not been subject to any approval process by the

Add to Reading List

Source URL: onem2m.org

Language: English - Date: 2015-02-01 09:31:22
677Public-key cryptography / Email authentication / Email / S/MIME / Public key infrastructure / Secure communication / Email client / Secure messaging / Cryptography / Computing / Internet privacy

Totemo TrustMail® Overview Totemo TrustMail® is a complete, standards-based encryption solution that runs on Sentrion, supporting S/MIME and OpenPGP. It provides an Internal Encryption option that simplifies management

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2012-04-04 15:31:26
678Public-key cryptography / Privacy / Human rights / PGP / Bitcoin / Secure communication / Public key infrastructure / HTTP cookie / Public key fingerprint / Cryptography / Internet privacy / Computing

Privacy technologies grad seminar: Online discussion prompts This document lists the online discussion prompts for privacy graduate seminar at Princeton, Fall 2012. See the link for the reading list.

Add to Reading List

Source URL: randomwalker.info

Language: English - Date: 2013-11-14 23:44:26
679Data security / Secure communication / National security / Security breach notification laws / Data breach / Health Insurance Portability and Accountability Act / Identity theft / Information security / Government procurement in the United States / Security / Computer security / Computer network security

STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific data breach incid

Add to Reading List

Source URL: www.privacyandsecuritymatters.com

Language: English - Date: 2015-01-06 12:58:06
680Electronic engineering / Mobile phone / Ringtone / Mobile telephony / Mobile phone features / Technology / Mobile telecommunications / Mobile technology

PHONE USE POLICY 1. Preamble Phone communication, whether by fixed or mobile phone, is an integral part of daily University life. This policy seeks to balance the benefits of flexibility and efficiency offered by phone

Add to Reading List

Source URL: intranet.secure.griffith.edu.au

Language: English - Date: 2009-01-11 22:57:36
UPDATE