|
No information avaiable
http://www.rsa.com/rsalabs/node.asp?id=2152
popularity:
cryptography
security
rsa
faq
crypto
reference
encryption
programming
theory
laboratories
|
|
Keyczar: An open source cryptographic toolkit ... Introducing Keyczar ... Keyczar was originally developed by members of the Google Security Team and is ...
similarity:
popularity:
security
python
cryptography
java
programming
opensource
google
software
library
tools
|
|
FÉDÉRALE DE LAUSANNE. http://lasecwww.epfl.ch/ gavoine/rfid ... Tag-to-Reader channel: up to a few meters. http://lasecwww.epfl.ch/ gavoine/rfid ...
similarity:
popularity:
security
cryptography
research
reference
password
technology
computer
laboratory
epfl
website
|
|
Software solutions are certainly an option, but I think you could also consider ... here<BR/><A HREF="http://code.google.com/p/clipperz" REL="nofollow">http://code.google.com/p ...
similarity:
popularity:
javascript
library
encryption
cryptography
security
crypto
opensource
ajax
programming
development
|
|
No information avaiable
similarity:
popularity:
security
software
encryption
cryptography
crypto
disk
privacy
tools
networking
filesystem
|
|
Contains updated information, FAQs and relevant links regarding the latest PGP versions.
similarity:
popularity:
security
pgp
encryption
software
privacy
crypto
tools
cryptography
opensource
freeware
|
|
victor@shoup.net. Current Address: New York University. Courant ... A book introducing basic concepts from computational number theory and algebra, ...
similarity:
popularity:
math
cryptography
research
crypto
people
programming
theory
mathematics
papers
security
|
|
The Entropy Key is a small, unobtrusive and easily installed USB stick that ... It has been developed by UK-based Simtec Electronics, a design consultancy and ...
similarity:
popularity:
security
hardware
entropy
usb
linux
cryptography
encryption
crypto
electronics
random
|
|
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
|
|
<a class="ot-issue-link" href="http://code.google.com/p/as3crypto/issues/detail?id=12#c0">issue 12</a> (Does it support reading keys from a keystore? ...
similarity:
popularity:
as3
actionscript
encryption
security
flash
flex
library
cryptography
crypto
opensource
|
|
Things you might not know about cryptographer and security expert Bruce Schneier
similarity:
popularity:
security
humor
cryptography
fun
programming
funny
schneier
encryption
facts
math
|