Strong cryptography

Results: 135



#Item
71Electronic commerce / Cryptographic protocols / DigiCert / Wikimedia Foundation / Certificate authority / Public key certificate / X.509 / Public key infrastructure / Wikipedia / Cryptography / Public-key cryptography / Key management

CASE STUDY: Wikimedia Foundation partners with DigiCert for strong security and streamlined management

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2013-11-04 20:48:00
72Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Bruce Schneier / Cryptography / Cipher / SHA-1

Draft revision: ea089c8[removed]:11:44 +0100) Aaron Kaplan Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, Ul

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
73Computing / Software / Internet protocols / Internet standards / Secure communication / Transport Layer Security / Microsoft CryptoAPI / Public key certificate / Application programming interface / Cryptography / Electronic commerce / Cryptographic software

Developer-Resistant Cryptography Kelsey Cairns and Graham Steel Abstract “Properly implemented strong crypto systems are one of the few things that you can rely on” - Edward Snowden. So why is mass surveillance so su

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
74Two-factor authentication / Internet protocols / Security token / Password / Authentication / AKA / Symantec / Anakam / Password manager / Cryptography / Security / Computer security

PARTNER BRIEF: STRONG, SMARTER USER AUTHENTICATION ........................................ Effective, User-Friendly Solution Addresses Security Challenges of Today’s Mobile Business

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-10-22 07:19:00
75Cryptography / Password / Password strength / Password cracking / Security / Computer security / Access control

Introduction • Creating strong passwords may seem daunting, especially when you have many online accounts you need to protect. Anyone would be

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-09-24 17:50:24
76Cryptography / Password / Password strength / Password cracking / Security / Computer security / Access control

Introduction • Creating strong passwords may seem daunting, especially when you have many online accounts you need to protect. Anyone would be

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-09-24 17:50:24
77Cryptographic software / Data security / Internet privacy / Encryption / Password / Security token / Data Encryption Standard / Information security / Secure communication / Cryptography / Security / Disk encryption

Fact Sheet #16 - Health-Care Requirement for Strong Encryption

Add to Reading List

Source URL: www.hamiltonhealthsciences.ca

Language: English - Date: 2011-01-25 16:29:44
78Digital signature / Key management / Notary / Cyberwarfare / Security / Cryptography / Public-key cryptography / Civil law

Sanitizable signatures with strong transparency in the standard model Shivank Agrawal, Swarun Kumar, Amjed Shareef and C. Pandu Rangan Theoretical Computer Science Lab, Department of Computer Science and Engineering, Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-04-02 02:07:27
79National Security Agency / Key size / Symmetric-key algorithm / Triple DES / Project 25 / Wireless security / Secure voice / Strong cryptography / Key Wrap / Cryptography / Data Encryption Standard / Advanced Encryption Standard

DHS Office of Emergency Communications Guidelines for Encryption in Land Mobile Radio Systems September 2013

Add to Reading List

Source URL: www.azpsic.gov

Language: English - Date: 2013-10-02 16:37:55
80Computer network security / Two-factor authentication / Entrust / Authentication / Challenge-response authentication / Strong authentication / Password / Security token / Security / Cryptography / Computer security

shutterstock_70571425 [Converted].eps

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-03-05 16:58:18
UPDATE