The Crypt

Results: 208



#Item
101Online backup services / Cryptography / Mozy / Web hosting / Cryptographic software / Crypt / Remote backup service / Advanced Encryption Standard / Encryption / Computing / Software / Cloud storage

Securing and Encrypting Cloud Backup The MozyEnterprise® advantage Simple Seamlessly manage backup, sync,

Add to Reading List

Source URL: mozy.com

Language: English
102Immune system / Apoptosis / Immunology / Proteins / Annexin / Fas receptor / Enterocyte / Microfold cell / Lectin / Biology / Cell biology / Programmed cell death

The glycan-binding protein galectin-1 controls survival of epithelial cells along the crypt-villus axis of small intestine

Add to Reading List

Source URL: www.nature.com

Language: English
103Password / John the Ripper / Passphrase / Dictionary attack / Key derivation function / Crypt / Crack / Part-of-speech tagging / Password manager / Cryptography / Computer security / Security

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32
104Computing / Password / Remote backup service / Crypt / Encryption / Encrypting File System / FileVault / Cryptographic software / Cryptography / Computer security

White Paper Benefits of Secure Off-Site Online Backup In today’s computing environment, businesses are relying on computers to perform daily business activities as well as mission critical functions. The use of compute

Add to Reading List

Source URL: www.firstbackup.com

Language: English - Date: 2007-03-16 17:00:00
105Hashing / Key management / PBKDF2 / SHA-2 / HMAC / Crypt / MD5 / Password / Key / Cryptography / Error detection and correction / Cryptographic hash functions

MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit 2

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2015-03-17 06:27:44
106Computer security / Cryptography / Password strength / Password / Crypt / Security

USENIX Association Proceedings of the 13th USENIX Security Symposium San Diego, CA, USA August 9–13, 2004

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2008-08-02 12:40:47
107SHA-2 / SHA-1 / MD4 / NIST hash function competition / MD5 / RIPEMD / Hash function / Secure Hash Standard / Crypt / Cryptographic hash functions / Error detection and correction / Cryptography

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
108Password / Cryptographic software / Crypt / Password cracking / Password policy / Security / Computer security / Cryptography

Problems with passwords Overview Most current password systems for the Internet are flawed. Designs that were almost acceptable 10 and 15 years ago have not been updated. Instead of moving to integrating authentication s

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:35
109Password / Ciphertext indistinguishability / Dropbox / Comodo Group / Unified Extensible Firmware Interface / Crypt / Chosen-plaintext attack / Man-in-the-middle attack / Plaintext / Software / Computing / Cryptography

Security Now! #Q&A #208  This week on Security Now! ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-03-17 16:05:33
110Cemetery / Burial / Cremation / Allotment / Mausoleum / Crypt / Death customs / Culture / Archaeology

Australian Capital Territory Cemeteries and Crematoria (Public Cemetery Fees) Determination[removed]No 1) Disallowable Instrument DI 2011 – 134 Made under the

Add to Reading List

Source URL: www.legislation.act.gov.au

Language: English - Date: 2012-07-01 19:52:23
UPDATE