Search

Your search keyword '"DATA encryption"' showing total 46 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic computer software Remove constraint Topic: computer software Topic data protection Remove constraint Topic: data protection
46 results on '"DATA encryption"'

Search Results

1. Psst, Can You Keep a Secret?

2. SELF-SYNCHRONIZATION TECHNIQUES USED TO ENCRYPT DATA STRINGS OF TELEPHONE AND DATA SUBSCRIBERS SYSTEMS.

3. American Political Science Asssociation.

4. A generalization of Paillier's public-key system with applications to electronic voting.

5. A Fault Attack on Pairing-Based Cryptography.

6. On the security of the WinRAR encryption feature.

7. Fujisaki–Okamoto hybrid encryption revisited.

8. On the security of fair non-repudiation protocols.

9. Efficient Pairing‐Based Threshold Proxy Signature Scheme with Known Signers.

10. Securing Communications and Files.

11. Digital Evidence.

12. Editorial Pointers.

13. Rights OF PASSAGE.

14. Creating and Implementing MS Office Security.

15. COMPANIES TO WATCH: PUBLIC.

16. Lock Down the Data on Your Portable Drives.

17. Speedy Security.

18. D-I-Y SECURITY.

19. Hidden Writing and National Security.

20. Sophos makes pitch for Utimaco.

21. To encrypt or not to encrypt.

22. How to Secure Files on Your Hard Drive.

23. Are You Plugging USB Data Leaks?

24. Latest Security Services.

25. Crypto cuts both ways.

26. Common Sense About Sensitive E-mail.

27. Mobile security suite resides on the client side.

28. Security Software for Individual Personal ComputersReleased.

29. WinZip 9.0 ends file-size limits.

30. PGP Makes Privacy Universal.

31. Intel's Hot Numbers Promise More Privacy.

32. PROTEGRITY OFFERS SECURE.DATA FOR RED HAT ENTERPRISE LINUX.

33. Firms Take Steps to Head Off Encryption Dangers.

34. Untitled.

35. Ohio Breach Prompts Public Data Encryption.

36. Quick TAKES.

37. ON THE MARK.

38. Skype's Office Hours.

39. EMC to Add Encryption Tools to Its Disk Arrays.

40. CryptoMetrics: Security at Your Fingertips.

41. Privacy- Minded Security.

42. Security Is an Architecture, Not an Appliance: : :.

43. Pick a Number.

44. Possession Is Nine-Tenths of the Hack.

45. Data Security Breaches Reveal Encryption Need.

46. PC Guardian Unveils Eplus-CDROM v3.1.

Catalog

Books, media, physical & digital resources