Search

Your search keyword '"DATA encryption"' showing total 136 results
136 results on '"DATA encryption"'

Search Results

1. Psst, Can You Keep a Secret?

2. Automated Detection of Client-State Manipulation Vulnerabilities.

3. SELF-SYNCHRONIZATION TECHNIQUES USED TO ENCRYPT DATA STRINGS OF TELEPHONE AND DATA SUBSCRIBERS SYSTEMS.

4. American Political Science Asssociation.

5. POSTCARDS FROM THE NETWORK EDGE.

6. Differential Fault Analysis for Round-Reduced AES by Fault Injection.

7. A generalization of Paillier's public-key system with applications to electronic voting.

8. A CLASSROOM PROJECT ON PROTECTING SOCIAL SECURITY NUMBERS FROM IDENTITY THEFT.

9. When Efforts To Conceal May Actually Reveal: Whether First Amendment Protection Of Encryption Source Code and the Open Source Movement Support Re-Drawing The Constitutional Line Between the First Amendment and Copyright.

10. Multi-Segment Steganography Technique.

11. Impossible differential attack on seven-round AES-128.

12. Global SA&D Approach for New Information Systems Architectures Security.

13. A Fault Attack on Pairing-Based Cryptography.

14. On the security of the WinRAR encryption feature.

15. Fujisaki–Okamoto hybrid encryption revisited.

16. On the security of fair non-repudiation protocols.

17. Efficient Pairing‐Based Threshold Proxy Signature Scheme with Known Signers.

18. OpenSSH: The Swiss Army Knife for Secure Networking.

19. Lost data prompts need for secretive stash.

20. Documenting And Evaluating The Security Guarantees Of You Apps.

21. TAMING MOBILE DATA.

22. Accessing V5R2 Cryptographic Services APIs from RPG.

23. Employ Strong Encryption in Your Apps with Our CryptoUtility Component.

24. Securing Communications and Files.

25. For Your Eyes Only.

26. Unease of Use.

27. Moving On From Windows XP.

28. TURN DISASTER INTO DISRUPTION.

29. SQL Server 2008 BOOSTS Built-in Encryption.

30. Digital Evidence.

31. Editorial Pointers.

32. Rights OF PASSAGE.

33. Creating and Implementing MS Office Security.

34. Seven tips for migrating EMR patient data to another provider.

35. Secure the network.

36. Group Test: Encryption at rest.

37. COMPANIES TO WATCH: PUBLIC.

38. The Keys to Tape Encryption.

39. RAM VULNERABILITY EXPOSED!

40. Lock Down the Data on Your Portable Drives.

41. Encrypting business data stored on computer media.

42. Encrypt important files.

43. Get Yourself A Manager.

44. Buyer's Guide:.

45. Speedy Security.

46. D-I-Y SECURITY.

47. A safe place to keep documents.

48. Hidden Writing and National Security.

49. Server makers rushing out Heartbleed patches.

50. MANAGING YOUR PASSWORDS.

Catalog

Books, media, physical & digital resources