Crypto-1

Results: 298



#Item
131Network architecture / Virtual private network / Computing / Computer network security / Crypto-anarchism / Internet privacy

VPN VEJLEDNING TIL IOS IOS 7 1

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2014-09-23 03:23:49
132Computing / Internet / Human rights / Anonymity / Internet ethics / Pseudonymity / Privacy / Tor / Crypto-anarchism / Ethics / Internet privacy / Computer law

1    Anonymity and Encryption   Comments submitted to the United Nations Special Rapporteur on  the Promotion and Protection of the Right to Freedom of Opinion 

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-06-02 08:49:14
133Computing / Crypto-anarchism / Virtual private network / Cyberwarfare / Computer architecture / Tunneling protocols / Computer network security / Network architecture / Internet privacy

Guidelines for renewal of VPN account 1. VPN team is mailing prefilled VPN application as per existing information available and sending the auto generated pdf to the user with copy to the respective NIC coordinator atl

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2015-02-06 04:34:51
134Computing / Crypto-anarchism / Virtual private network / Gemalto / Computer security / Cyberwarfare / Computer network security / Internet privacy / Network architecture

Name of the Document Classification General Version 1.0

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-05-22 06:30:04
135Computing / Computer architecture / Virtual private networks / Computer security / Crypto-anarchism / UT-VPN / Computer network security / Internet privacy / Network architecture

Instructions for Online Registration for VPN Connection 1. The online registration form is available in http://vpn.nic.in site. 2. The Section I of the form has to be filled by the user who will be accessing VPN services

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-01-22 23:24:57
136SHA-2 / SHA-1 / HMAC / Crypto++ / Crypt / NIST hash function competition / Tiger / HAS-160 / Cryptographic hash functions / Error detection and correction / Cryptography

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
137

Vondruška, P.: Kryptologie, šifrování a tajná písma, nakladatelství Albatros, edice OKO, Praha, 2006 Ukázka z kapitoly 1. Abychom si rozuměli … Dešifrování Dešifrování je opačný proces k šifrování.

Add to Reading List

Source URL: www.crypto-world.info

Language: Czech - Date: 2006-09-29 18:22:44
    138Computer network security / Internet privacy / Crypto-anarchism / Virtual private network / MPLS VPN / Customer-premises equipment / Single-pair high-speed digital subscriber line / Service-level agreement / Cloud computing / Network architecture / Computing / Computer architecture

    Standard Form of Agreement Service Description (MPLS VPN Cloud) Revised 15-Aug-2012 1

    Add to Reading List

    Source URL: www.zetta.net.au

    Language: English - Date: 2012-08-15 04:33:16
    139

    Vondruška, P.: Kryptologie, šifrování a tajná písma, nakladatelství Albatros, edice OKO, Praha, 2006 Ukázka z kapitoly 3. Šifry, které nikdy skutečnými šiframi nebyly Jednoduchá záměna č. 1 (knihy) K la

    Add to Reading List

    Source URL: www.crypto-world.info

    Language: Czech - Date: 2006-09-29 18:22:48
      140SHA-1 / Wang Xiaoyun / Serge Vaudenay / Collision resistance / Random oracle / Jean-Jacques Quisquater / Eurocrypt / Cryptography / Cryptographic hash functions / Hashing

      CRYPTO 2005 Rump Session Program 19::35 20::21

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2005-08-16 15:12:59
      UPDATE