Cryptographic software

Results: 2705



#Item
71Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
72Michael Richardson (v:Personal Information Languages English Fluent, French Conversational Contact Information Address: 470 Dawson Avenue, Ottawa, Ontario, K1Z 5V7

Michael Richardson (v:Personal Information Languages English Fluent, French Conversational Contact Information Address: 470 Dawson Avenue, Ottawa, Ontario, K1Z 5V7

Add to Reading List

Source URL: www.sandelman.ca

Language: English - Date: 2014-10-15 11:56:16
73   File-encryption tool secureEFS

  File-encryption tool secureEFS

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2006-10-11 09:39:11
74Measuring Relationship Anonymity in Mix Networks Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT Many applications of mix networks such as anonymous Web browsing require relationship anonym

Measuring Relationship Anonymity in Mix Networks Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT Many applications of mix networks such as anonymous Web browsing require relationship anonym

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:56:09
75How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. To decrypt the files:

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. To decrypt the files:

Add to Reading List

Source URL: www.nomoreransom.org

Language: English - Date: 2016-07-25 04:33:08
76Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction Yanlin Li1 , Yueqiang Cheng1 , Virgil Gligor1(B) , and Adrian Perrig2 1  2

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction Yanlin Li1 , Yueqiang Cheng1 , Virgil Gligor1(B) , and Adrian Perrig2 1 2

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-12-08 03:13:02
77LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
78Software VersionEnd User Guide Release Date: 10th March, 2011  InCommon

Software VersionEnd User Guide Release Date: 10th March, 2011 InCommon

Add to Reading List

Source URL: wiki.mst.edu

Language: English - Date: 2011-07-26 12:43:50
79Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems

Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems

Add to Reading List

Source URL: www.g10code.de

Language: English - Date: 2015-11-01 10:38:20
80Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05