Symmetric-key algorithm

Results: 348



#Item
51

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
52Advanced security prevents counterfeit products

Advanced security prevents counterfeit products

Add to Reading List

Source URL: www.insidesecure.com

Language: English
53ACLU Submission to the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression February 10, 2015 The American Civil Liberties Union thanks the Special Rapporteur on the Promot

ACLU Submission to the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression February 10, 2015 The American Civil Liberties Union thanks the Special Rapporteur on the Promot

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
54PIN Security Requirements

PIN Security Requirements

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:44
55Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:02
56Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
57An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
58SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
59DATA CENTER  Encryption Solution Design and Deployment Considerations This Encryption Solution Design and Deployment Considerations reference guide is designed to help customers and partners

DATA CENTER Encryption Solution Design and Deployment Considerations This Encryption Solution Design and Deployment Considerations reference guide is designed to help customers and partners

Add to Reading List

Source URL: www.brocade.com

Language: English - Date: 2014-10-16 13:08:00
60ACISP 2015 Accepted papers Australasian Conference on Information Security and Privacy Queensland University of Technology, Gardens Point, Brisbane www.acisp2015.qut.edu.au  Paper

ACISP 2015 Accepted papers Australasian Conference on Information Security and Privacy Queensland University of Technology, Gardens Point, Brisbane www.acisp2015.qut.edu.au Paper

Add to Reading List

Source URL: www.acisp2015.qut.edu.au

Language: English - Date: 2015-04-12 20:54:57