Cryptography

Results: 21893



#Item
891Computing / Security / Information technology management / Computer network security / Computer security / Crime prevention / Cryptography / National security / Information security / Security appliance / Intrusion detection system / Firewall

Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

Add to Reading List

Source URL: esd.ny.gov

Language: English - Date: 2016-04-19 12:12:44
892Security / Prevention / Information technology management / Computer security / Data security / Cryptography / National security / Information security / Security management / Asset / ISO/IEC 27001:2013 / ISO/IEC 27001:2005

Bit10 IT Security Policy 1. Introduction Bit10 develops web and mobile applications and provides hosting services for websites and servers. The importance of the data on these systems is of paramount importance to Bit10

Add to Reading List

Source URL: www.bit10.net

Language: English - Date: 2015-09-15 10:13:06
893Cryptography / Email / Public key certificate

Microsoft Word - Duplicate - Address Change Form 2016.doc

Add to Reading List

Source URL: doe.sd.gov

Language: English - Date: 2016-07-01 07:29:24
894Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Internet privacy

CROWD VALLEY Security Policies Updated 22nd October 2015

Add to Reading List

Source URL: crowdvalley.com

Language: English - Date: 2016-08-04 10:56:39
895Cryptography / Real property law / Key management / Public key infrastructure / Public-key cryptography / English property law / Land Registry / Conveyancing / Public key certificate / Land registration / Identity document / Certificate authority

Electronic Conveyancing National Law (Victoria) Participation Rules Determined by the Registrar of Titles Version 3

Add to Reading List

Source URL: www.dtpli.vic.gov.au

Language: English - Date: 2015-09-29 22:04:14
896Quantum cryptography / Physics / Quantum information science / Cryptography / Quantum mechanics / Optics / Quantum key distribution / Emerging technologies / Laser / Quantum optics / John Rarity / Photon

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

Add to Reading List

Source URL: qist.lanl.gov

Language: English - Date: 2004-07-27 17:15:17
897Cryptography / Economy / Finance / Financial institutions / Insurance / Types of insurance / Cancellation / Public key certificate

B&L Insurance Certificate

Add to Reading List

Source URL: www.odfl.com

Language: English - Date: 2016-03-28 13:11:40
898Abstract algebra / Algebra / Mathematics / Finite fields / Modular arithmetic / Computer arithmetic / Complex analysis / Residue number system / Elliptic curve cryptography / Pi / Addition / XTR

DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose Hector Pettenghi, Leonel Sousa

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-03-08 09:35:27
899Publishing / Business / Mass media / Electronic publishing / Copyright law / Cryptography law / Digital rights management / Universal Windows Platform apps / Rakuten / ITunes Store / E-book / Fictionwise

Microsoft Word - EFF Request for Investigation re Labeling DRM-Limited Products.docx

Add to Reading List

Source URL: assets.documentcloud.org

Language: English - Date: 2016-08-05 19:06:54
900Standards organizations / Computing / Cryptography / BAI / ASC X9 / Technology / X9 / American National Standards Institute / ASC / Edward Scheidt / Society for Worldwide Interbank Financial Telecommunication

ANSI X9.121–2015 American National Standard for Financial Services ANSI X9.121–2015

Add to Reading List

Source URL: x9.org

Language: English - Date: 2016-04-12 13:32:57
UPDATE