Cryptocat

Results: 10



#Item
1Secure communication / HTTP / Internet privacy / Public-key cryptography / HTTP Secure / Cryptocat / Encrypting File System / IBM Lotus Notes / Cryptography / Cryptographic software / Cryptographic protocols

Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-08-11 20:10:44
2Secure communication / HTTP / Internet privacy / Public-key cryptography / HTTP Secure / Cryptocat / Encrypting File System / IBM Lotus Notes / Cryptography / Cryptographic software / Cryptographic protocols

Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
3Computing / Internet privacy / HTTP / Mozilla add-ons / PGP / HTTP Secure / Cryptocat / Tor / GPGTools / Cryptographic software / Software / System software

STOA - Science and Technology Options Assessment HOW TO PROTECT YOUR PRIVACY IN INTERNET This document provides a non-exclusive and not prioritized list of software tools and services that help citizens to protect their

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:04
4Internet / Software / Privacy / Email privacy / Tor / Proxy server / Cryptocat / GNU Privacy Guard / Electronic Privacy Information Center / Internet privacy / Cryptographic software / Computing

Privacy Resources and Sites on the Internet

Add to Reading List

Source URL: whitepapers.virtualprivatelibrary.net

Language: English - Date: 2015-01-06 16:47:52
5Computing / Internet privacy / HTTP / PGP / Mozilla add-ons / Cryptocat / Tor / HTTP Secure / GPGTools / Cryptographic software / Software / System software

Scientific Foresight (STOA) HOW TO PROTECT YOUR PRIVACY IN INTERNET This document provides a non-exclusive and not prioritized list of software tools and services that help citizens to protect their privacy in Internet

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-09 09:22:07
6Cryptographic software / Computer security / Cross-platform software / Webmail / Key management / Cryptocat / Gmail / Public-key cryptography / Cipher / Cryptography / Computing / Internet privacy

ShadowCrypt: Encrypted Web Applications for Everyone Warren He Devdatta Akhawe Sumeet Jain

Add to Reading List

Source URL: devd.me

Language: English
7Cryptographic protocols / Secure communication / HTTP / Software / System software / Client-side / HTTP Secure / Cryptocat / Password / Computing / Cryptographic software / Internet privacy

SECURITY Building Web Applications on Top of Encrypted Data Using Mylar R A L U C A A D A P O PA , E M I LY S TA R K , J O N A S H E L F E R , S T E V E N VA L D E Z , NICKOL AI ZELDOVICH, M . FR ANS K A ASHOEK , AND HAR

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
8Internet / Cryptocat / Secure communication / HTTP Secure / Gmail / Email / Google Chrome / Google / Internet privacy / Computing / Software

The Digital First Aid Kit for PDF

Add to Reading List

Source URL: digitaldefenders.org

Language: English - Date: 2014-08-06 09:05:25
9Secure communication / HTTP / Internet privacy / Public-key cryptography / HTTP Secure / Cryptocat / Encrypting File System / IBM Lotus Notes / Cryptography / Cryptographic software / Cryptographic protocols

Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:21:09
10Secure communication / HTTP / Internet privacy / Public-key cryptography / HTTP Secure / Cryptocat / Encrypting File System / IBM Lotus Notes / Cryptography / Cryptographic software / Cryptographic protocols

Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
UPDATE