Cryptography

Results: 21893



#Item
251Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-05-05 08:36:37
252Cryptography / E-commerce / Stock market / Key management / Public key infrastructure / Public-key cryptography / Password / Electronic trading / Certificate authority / Futures exchange / Security / Computer security

Guide to ensure information and communications security In the information society and globalized world of today, people are becoming more and more connected to their computers and the Internet. As a result, electronic t

Add to Reading List

Source URL: www.taifex.com.tw

Language: English - Date: 2012-04-19 04:47:00
253Security / Prevention / Computer security / Safety / Crime prevention / Cryptography / Information governance / National security / Service-level agreement / University of New Mexico / Information security / Service catalog

Information Security Assessments

Add to Reading List

Source URL: it.unm.edu

Language: English - Date: 2016-06-02 14:41:35
254Computer security / Security / Computing / Software requirements / Cryptography / Crime prevention / Information governance / National security / Protection Profile / Common Criteria / Security Target / Requirement

Microsoft Word - PPWorkshopOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
255Cryptography / Public key infrastructure / Cryptographic software / Email authentication / Key management / Email encryption / Public-key cryptography / S/MIME / Key / Encryption / Email / Pretty Good Privacy

Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 21:42:44
256Security / Prevention / Safety / Health informatics / Cryptography / Computer security / Crime prevention / National security / Personal health record / Electronic health record / Medical privacy / Regional Health Information Organization

Electronic Health Record Software Required Security Features and Recommendations for Technical Specifications of Single Source Contracts and RFI for the Behavioral Health Information Technology Grant Scope: the scope of

Add to Reading List

Source URL: www.fphny.org

Language: English - Date: 2016-04-29 15:58:09
257Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2014-03-02 06:27:58
258Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / International Multilateral Partnership Against Cyber Threats

Press Release Connected Vehicle Cybersecurity Creates Risks and Opportunities in Automotive Market, According to VDC Research Carmakers finally coming to grips with security threats, but still have a long road ahead. The

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-03-03 10:07:18
259Clinical psychology / Mental health / Psychotherapy / Social work / Computer access control / Cryptography / Health / Confidentiality / Prevention / Duty of confidentiality

Authorization for Use or Disclosure of Protected Health Information Client Information Client Last Name_______________________ First Name _________________MI ___ DOB:___/___/____ Client Address

Add to Reading List

Source URL: www.franklinabbott.com

Language: English - Date: 2016-07-27 16:12:38
260Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Internal control / Information security / Cyber-security regulation

JH2015/005 2nd September 2015 JHC Cyber Risk Assessment Guidance Background checks: 1

Add to Reading List

Source URL: comitemaritime.org

Language: English - Date: 2015-09-14 04:38:33
UPDATE