Email encryption

Results: 282



#Item
61Anti-spam / Computer-mediated communication / Internet / Anti-spam techniques / ID-based encryption / Content filtering / Proofpoint /  Inc. / Spam filtering / Email / Computing

» GROUP TEST l Email security There’s been a lot of convergence in email security and content management tools. Look for the granular differences, says Nathan Ouellette. T

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-03-17 20:00:10
62OSI protocols / Internet privacy / Computer security / Cryptography / S/MIME / MIME / Internet security / Echoworx / Computing / Email / Internet

S/MIME Encryption Overview S/MIME Encryption is our implementation of the S/MIME Gateway proposed standard, designed for economical integration and transparent use on the Sentrion Message Processor. This solution is used

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-04-21 19:52:07
63Email / Internet / Public-key cryptography / Electronic documents / S/MIME / Email client / ID-based encryption / Cryptography / Computing / Email authentication

User-Level_S:MIME Encryption

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2011-05-24 15:35:31
64Windows Server / Azure / Microsoft Windows / BitLocker Drive Encryption / Microsoft / Computing / Azure Services Platform

Jessica’s IT Camp Resources – Los Angeles Email: Blog: www.theubergeekgirl.com Twitter: @ubergeekgirl Facebook: https://www.facebook.com/westitpros

Add to Reading List

Source URL: www.theubergeekgirl.com

Language: English - Date: 2015-03-19 12:01:48
65Chosen-ciphertext attack / ElGamal encryption / Advantage / Chosen-plaintext attack / Hybrid cryptosystem / Integrated Encryption Scheme / Ciphertext / Cipher / RSA / Cryptography / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
66Data / Computing / Two-way radio / Email encryption / Voice over IP / Telecommunication / Communications protocol / Secure communication / Secure multicast / Internet privacy / Project 25 / Electronics

One-Way Cryptography Sandy Clark Travis Goodspeed Perry Metzger

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2011-08-20 14:32:00
67Polynomial / ElGamal encryption / NTRUEncrypt / Ideal lattice cryptography / Cryptography / Lattice problem / One-way function

Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-27 12:23:14
68Email / Email attachment

Service Desk Tool Attaching and viewing encrypted files • Only Analysts with the Service Desk Tool (SDT) Encryption role can create and view

Add to Reading List

Source URL: intranet.secure.griffith.edu.au

Language: English - Date: 2015-02-04 17:34:54
69Data security / Cryptographic software / Security / Computer security / Email / Encryption / S/MIME / Backup / Password / Cryptography / Disk encryption / Computing

ISSG-14-11_Information_Handling_Guidelines_1_0

Add to Reading List

Source URL: as.exeter.ac.uk

Language: English - Date: 2015-05-22 07:15:56
70Disk encryption / Cryptographic protocols / Cross-platform software / TrueCrypt / Secure communication / AES implementations / HTTP Secure / Man-in-the-middle attack / Fortuna / Software / Cryptography / Cryptographic software

Security Now! #The TrueCrypt Audit  ( Elaine is fine! -- It was apparently just a transient eMail glitch. All is wel! ) This week on Security Now! ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-07 13:11:05
UPDATE