Crypto-1

Results: 298



#Item
231File sharing networks / Internet privacy / Cross-platform software / I2P / Crypto-anarchism / Proxy server / Kad network / Tor / HTTP / Computing / Software / Concurrent computing

I2P’s Usage Characterization Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Henri Poincar´e University, Nancy 1, France Abstract. We present the first monitori

Add to Reading List

Source URL: pam2012.ftw.at

Language: English - Date: 2012-03-21 05:49:36
232Network architecture / Crypto-anarchism / Virtual private network / System Preferences / Computing / Computer architecture / Information technology management / Computer network security / Internet privacy / Mac OS X

KeyServer FAQ Version 1.0 | February 2014 | HUIT Service Desk KeyServer FAQ: What is KeyServer?

Add to Reading List

Source URL: huit.harvard.edu

Language: English - Date: 2014-02-24 16:23:49
233Soil crust / Cigarette / Wheelie / Litter / Lichens / Cryptobiotic soil / Soil biology

Visiting our monument safely during regular business hours and after hours. The following list of rules is to help make your visit safe and enjoyable. 1. Stay on designated trails to protect biological soil crust (Crypto

Add to Reading List

Source URL: www.nps.gov

Language: English - Date: 2011-09-06 16:34:36
234Public-key cryptography / Information-theoretic security / Verifiable secret sharing / Computer security / Cloud computing / Password / Secret sharing / Quantum cryptography / Trustworthy computing / Cryptography / Cryptographic protocols / Secure multi-party computation

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33
235Computing / Computer security / Computer architecture / Crypto-anarchism / Virtual private network / Tunneling protocols / UT-VPN / Computer network security / Internet privacy / Network architecture

APSCN VPN Settings for Windows 7 __________________________________________________________ 2 1. Creating a VPN Connection ____________________________________________________________________ 2 2.

Add to Reading List

Source URL: bombers.k12.ar.us

Language: English - Date: 2013-08-28 10:53:45
236Computer security / Cryptography standards / Microsoft CryptoAPI / FIPS 140-2 / Cryptographic Service Provider / FIPS 140 / SHA-1 / CryptGenRandom / Crypto++ / Cryptography / Cryptographic software / Computing

Microsoft Word - 01o - TC-SecPol-27.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
237Advanced Encryption Standard / Zeroisation / Critical Security Parameter / FIPS 140 / Cryptographic hash function / Cryptographic Module Validation Program / Block cipher modes of operation / Crypto++ / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - 8a - Security Policy ver1.5.6_1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-01-25 12:16:30
238Data Encryption Standard / SHA-1 / FIPS 140-2 / FIPS 140 / HMAC / RC5 / DES-X / Block cipher / Crypto++ / Cryptography / Cryptographic software / Cryptography standards

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
239Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
240FIPS 140-2 / FIPS 140 / Critical Security Parameter / Over the Air Rekeying / Zeroisation / National Security Agency / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word[removed]Security Policy ver2.1.3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-03-28 14:00:42
UPDATE