<--- Back to Details
First PageDocument Content
Data management / Data security / Information security / Encryption / USB flash drive / Public safety / National security / Export of cryptography in the United States / Security / Disk encryption / Cryptographic software
Date: 2012-01-24 19:08:13
Data management
Data security
Information security
Encryption
USB flash drive
Public safety
National security
Export of cryptography in the United States
Security
Disk encryption
Cryptographic software

Removable Media Acceptable Use Procedures - Clarification and Guidance

Add to Reading List

Source URL: www.ok.gov

Download Document from Source Website

File Size: 65,01 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Cryptographic software / Disk encryption / Secure communication / Transport Layer Security / Galois/Counter Mode / CCM mode / Cipher suite

Microsoft Word - Encryption_Documentation_for_Beekeeper_Product_and_Services.docx

DocID: 1xVZT - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cryptographic software / Public key infrastructure / ID-based encryption / Encryption / Key / Identity-based conditional proxy re-encryption / Deniable encryption

April 17, 2018 An Introduction to Attribute-Based Encryption Attribute Based Encryption Encryption is a method of encoding data that protects the confidentiality of its contents from unauthorized attackers. Traditionall

DocID: 1xVLe - View Document

Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

DocID: 1xVxZ - View Document

Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

DocID: 1xVie - View Document

Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

DocID: 1xV7Y - View Document