Alice and Bob - Wikipedia, the free encyclope...
No information avaiable
http://en.wikipedia.org/wiki/Alice_and_Bob
popularity:
cryptography
security
reference
wikipedia
alice
encryption
networking
culture
bob
email
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
Wiretapped - Computer Security Software etc.
No information avaiable
similarity:
popularity:
security
hacking
software
tools
networking
internet
linux
network
cryptography
reference
|
FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
similarity:
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
PGP Corporation - Home Page
Helps companies secure e-business operations through firewall, encryption, and intrusion detection.
similarity:
popularity:
security
encryption
pgp
software
privacy
tools
cryptography
internet
email
technology
|
LASEC
FÉDÉRALE DE LAUSANNE. http://lasecwww.epfl.ch/ gavoine/rfid ... Tag-to-Reader channel: up to a few meters. http://lasecwww.epfl.ch/ gavoine/rfid ...
similarity:
popularity:
security
cryptography
research
reference
password
technology
computer
laboratory
epfl
website
|
The PKI page
the PKI page ... The PKI page. This page contains links to various sites and documents which are ... Some links may be missing, other links may be out of date ...
similarity:
popularity:
pki
security
cryptography
ssl
x509
ca
reference
encryption
crypto
standards
|
bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|
CVE - Common Vulnerabilities and Exposures (CVE)
Aims to standardize the names for all publicly known vulnerabilities and security exposures.
similarity:
popularity:
security
vulnerability
reference
vulnerabilities
exploits
hacking
networking
computer
cve
database
|
ScramDisk - Free Disk Encryption Software
No information avaiable
similarity:
popularity:
security
software
encryption
cryptography
crypto
disk
privacy
tools
networking
filesystem
|