Printer Friendly

Browse Encryption software topic

Usage subtopic

Articles

1-25 out of 25 article(s)
Title Author Type Date Words
Effective Fog Networking Communications using An Attribute-Based Encryption Scheme Decentralized Server. T., Archana; S., Oviya; R., Janani; S., Ponnarasi Report Oct 1, 2017 2323
Data reduction using sliding window protocol in content defined chunking. Magneta, S. Christina; Aswani, P.B.; Sangeeth, Serena; Mathew, Jerin T. Report Mar 1, 2017 3311
A Scheme To Encrypt The Entire Web Is Actually Working. Brief article Apr 21, 2016 291
National commission on terrorists' use of technology is needed. Mayer, Matt A. Report Jan 1, 2016 3817
'Naked and afraid'. Van Alstin, Chad Michael Aug 1, 2015 651
Dell documents cyber criminal tactics. Report Jun 1, 2014 241
Free login vault service launched by my1login. Brief article Mar 1, 2012 201
Simplifying shop floor PLC security. Brown, Alan S. Mar 1, 2012 296
Pakistan to ban encryption software. Brief article Sep 1, 2011 203
ViVOtech licenses Semtek's Cipher Hidden Encryption. Brief article Jul 27, 2010 204
Protect your portable data - always and everywhere: data portability and data security are not mutually exclusive. Learn how to have both. Petravick, Simon; Kerr, Stephen G. Jun 1, 2009 2567
Tighter budget, canny spending. Callahan, Michael Nov 1, 2008 1604
Protegrity's Defiance Data Protection System For Teradata Warehouse. Jun 1, 2008 290
Security code cracked. Thilmany, Jean May 1, 2008 469
Best practices for mobile defense: several encryption methods are available, but training and planning are also important. Brownlow, Jeff; Dale, Jonathan; Lofaso, Nick Sep 1, 2007 1612
FDIC to use e-mail encryption service from ZixCorp. Brief article Feb 1, 2007 143
One Day Mobile to introduce Babylon nG encryption software to the UK. Brief article Aug 15, 2006 255
Goteborg University to implement IdentityGuard authentication solution. Brief article Jul 11, 2006 104
Rogers Business Solutions and IBM introduce encrypted e-mail service in Canada. Brief article Jun 19, 2006 197
Worth a look: traveling with encryption. Piazza, Peter May 1, 2006 446
The encryption code. Britt, Phillip Mar 1, 2006 1341
Hidden in disorder: chaos-encrypted information goes the distance. Greene, K. Nov 19, 2005 501
Banking on encryption. Roberts, Marta Aug 1, 2005 1360
Proof-of-concept program released for Wi-Fi encryption algorithm. Brief Article Nov 8, 2004 126
WINDOWS ENCRYPTION PROGRAM SIMPLIFIES SENDING ENCRIPTED DATA. Jul 1, 2003 363

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters