「ENCRYPTION」の共起表現一覧(2語左で並び替え)
該当件数 : 200件
ate, then uses this state to perform a block | encryption using part of the key, and uses the result o |
wer trace from a smart card performing a DES | encryption, the sixteen rounds can be seen clearly. |
ission, which is to encrypt, using a digital | encryption key, all the files it finds on computer driv |
on of the RSA Secret-Key Challenge, a 56-bit | encryption algorithm that had a $10,000 USD prize avail |
In addition the | encryption using the AES 128 standard has been introduc |
140-2 compliant security model using AES 256 | Encryption |
compliance and regulatory agencies requiring | encryption for data at rest including, Health Insurance |
ion uses a 64-bit block cipher algorithm for | encryption and a proprietary compression algorithm. |
They also handled | encryption and decryption. |
, 2010: Acquired Mobile Armor; an innovative | encryption specialist based in St. Louis, Missouri, USA |
PGP Virtual Disk is an on-the-fly | encryption (OTFE) system that allows one to create a vi |
also claims to have written an "unbreakable" | encryption program, and made predictions for the year 2 |
It is an authenticated | encryption algorithm designed to provide both data auth |
esented in the paper Fast Hashing and Stream | Encryption with PANAMA on the Fast Software Encryption |
torage features such as backup and recovery, | encryption, deduplication and provisioning. |
TLS, OpenPGP and end-to-end | encryption support (OpenPGP not available under Windows |
10.6) with software tools for email and file | encryption (similar to Gpg4win for Windows). |
servers receives another share of K and the | encryption result of M using the key K , E(M,K). |
ased access control to information, and full | encryption of stored information and communications bet |
ion, WS-Security Signatures, and WS-Security | Encryption and included Windows Keystore, Java Keystore |
ection, intrusion prevention, email and file | encryption, firewalls, VPNs, vulnerability, and scannin |
s, distributed link tracking, and file-level | encryption, also known as the Encrypting File System (E |
mbines features of Trinoo with TFN, and adds | encryption. |
GPGServices: A services menu (text and file | encryption). |
plained that once the extension and filename | encryption tables are known, restoration is possible. |
ications, client-side authentication and AES | encryption. |
inations of XML Digital Signature and/or XML | Encryption |
at avoids DHS monitoring using anonymity and | encryption. |
Internet users to trust one another through | encryption and authentication. |
password being examined (including both the | encryption algorithm and key), and comparing the output |
Building in Big Brother: The | Encryption Policy Debate (Editor), Springer-Verlag, New |
rted features include resultset caching, SSL | encryption, custom data source, dbShield |
e wiretapper, on the other hand, can disrupt | encryption negotiation to force an unencrypted channel. |
sp supports image checksumming, compression, | encryption as well as integration with Splashy. |
in obscuring information about the choice of | encryption algorithm if that information is freely avai |
BestCrypt is a commercial disk | encryption program for Windows and Linux, developed by |
8 contained sophisticated communications and | encryption technology, and because portions of the debr |
Compression and | Encryption Support. |
I, and cloud storage), data compression, and | encryption, with specific support for Microsoft SharePo |
tary of Defense for Policy, concentrating on | encryption and information assurance issues. |
d its receiver and then attempt to crack the | encryption key being used to secure wireless communicat |
obtaining a password (either by cracking the | encryption, or through social engineering). |
his smart card, various cryptographic tasks ( | encryption, decryption, digital signing/verification, a |
Triple DES strong | encryption) |
ion with Andrew Viterbi to develop satellite | encryption devices. |
ing down a computer will usually discard the | encryption keys from memory. |
hat two advanced features, disk-spanning and | encryption, still require PKZIP. |
For coding for DRGs first | encryption to the valid version of the ICD-10-GM is (cu |
the Data Protection API can enable symmetric | encryption of any kind of data; in practice, its primar |
ing all the processing, mixing, encoding and | encryption on the clients, relieving the servers and in |
SubRosaSoft Encryptor, file/folder | encryption. |
rates with Nautilus, gedit and Evolution for | encryption, decryption and other operations. |
GpgEX: a plugin for Windows Explorer (file | encryption). |
it was first presented at the Fast Software | Encryption workshop in Leuven in 1994, and first publis |
virus control), personal firewall, antispam, | encryption, antispyware, and parental control. |
You may choose from five different | encryption algorithms (DES-64bit, 3DES-192bit, AES-256b |
rcial software program for "on the fly" disk | encryption (OTFE) for PC and PDA. |
ddy is a simple software application for the | encryption and compression of computer files to make th |
premium version of CRT with support for SSH | encryption, SecureCRT later replaced the CRT product en |
Alix proposed a controversial scheme for DRM | encryption of BBC content, which was the subject of a 4 |
imprinted with the programming code for RSA | encryption, boasting "This shirt is a controlled muniti |
Native support for PGP/GPG | encryption |
of operation specifically designed for disk | encryption (see disk encryption theory). |
Psi has built in GnuPG support for message | encryption. |
upports a unique type of system for wireless | encryption using the powerful wpa supplicant. |
the legal and technical aspects of full disk | encryption. |
les comprise logging functionality, Blowfish | encryption, user and channel management, away functiona |
Enigma - German message | encryption equipment. |
browser component, and OpenSSL or GnuTLS for | encryption. |
IBM - IBM Database | Encryption Expert uses Vormetric encryption technology |
ernet with computers aiding the users in the | encryption of their interactions. |
PDF support includes transparency, | encryption and a large set of the PDF 1.4 spec as well |
ned by aspects of WS-Security, including XML | Encryption and XML Digital Signatures. |
novated in a variety of areas, including RSA | encryption, the spreadsheet, the NuBus, the X Window Sy |
d 31 of the NLFSR state as its inputs during | encryption and bits 0, 8, 19, 25 and 30 during decrypti |
Instant messaging | encryption with Off-the-Record Messaging |
3) was a Swedish businessman and inventor of | encryption machines. |
If there is end-to-end | encryption between the sender and the recipient, then n |
SecureIM is an | encryption system built into the Trillian Instant Messe |
where E is the | encryption function (cipher), and K1 and K2 are the two |
The channel also dropped its Videoguard | encryption on Sky Digital on 1 July 2005, switching to |
As of June/2007, OpenPGP | encryption is being implemented. |
r Apple Mail that provides public key e-mail | encryption and signing. |
using the oracle's key, without knowing the | encryption key. |
GPGMail: A plugin for OS X Mail (email | encryption). |
Yet, it does make the | encryption of most internet traffic easy to implement, |
quipment such as network management systems, | encryption and networking solutions for internet connec |
This weakness affected many disk | encryption programs, including older versions of BestCr |
rch areas including mathematics, statistics, | encryption algorithms, neural networks, geophysics and |
Voodoo's method of | encryption encrypts all transfers of data from the prog |
er Areas, and A Discussion About Modern Disk | Encryption Systems. |
While most disk | encryption software implements different and incompatib |
Most disk | encryption systems overwrite their cached encryption ke |
er, which was a finalist for NIST's Advanced | Encryption Standard competition (with Bruce Schneier, J |
ng attacks are practical against a number of | encryption algorithms, including RSA, ElGamal, and the |
oftware development to security, a number of | encryption implementations and early static analysis to |
Message Obfuscating and | Encryption (incl. |
It is also known for a series of high-speed | encryption co-processors, offloading this processor-int |
nformation which reduces the security of the | encryption scheme. |
ark Washburn that used a form of polymorphic | encryption. |
n scrambling system was a form of television | encryption developed by Oak Industries in the early 198 |
cts (e.g. it only allows the use of AES-256 | encryption.) |
It is a form of disk | encryption software similar to Microsoft's Encrypting F |
City, and he is a proponent of opportunistic | encryption. |
The service makes use of AES | encryption for security, and uses data compression and |
It specifically targets the weaknesses of LM | encryption, and includes pre-computed data sufficient t |
eta-documents include: posting of asymmetric | encryption public keys, posting tokens that would be re |
nearly impossible to stop the use of strong | encryption for telephone communications. |
er's logon secrets, or in the case of system | encryption, using the system's domain authentication se |
overy requirements for the use of asymmetric | encryption keys for security and authenticated transact |
ouble Latte, Stock Options, Sea of Cubicles, | Encryption, Firewall, El Camino Real, The Sysadmin, and |
he US government allows the export of 56-bit | encryption software, and stronger encryption software f |
mpany announced that it would soon offer SSL | encryption for search (although not enabled by default) |
All protocols offer OpenSSL | encryption for additional security. |
FOPE also offers policy-based | encryption of email messages. |
, a watermarking attack is an attack on disk | encryption methods where the presence of a specially cr |
FreeOTFE is an open source on-the-fly disk | encryption (OTFE) computer program for PCs running Micr |
g the theory that the code is a One-time pad | encryption algorithm. |
easiest way to enable opportunistic website | encryption is by using self-signed certificates, but th |
Optional archive | encryption using AES (Advanced Encryption Standard) wit |
FreeOTFE originally offered | encryption using cipher-block chaining (CBC) with encry |
Scramdisk is a free OTFE (On-The-Fly | Encryption) program for Windows 95, Windows 98 and Wind |
It is similar in function to other disk | encryption programs including Microsoft's BitLocker. |
Unlike other Linux | encryption solutions such as dm-crypt, eCryptfs uses Fi |
phers that support single pass authenticated | encryption and can operate as collision-resistant hash |
gmail: The Mozilla Thunderbird plugin (email | encryption). |
pts of the sounds of cleartext printing from | encryption machines. |
DirecTV transmits programming with | encryption to mitigate signal piracy. |
ng, instead teaching himself programming and | encryption. |
r private or public anonymous proxy servers, | encryption or even spoofing, diversion and obfuscation |
SHA-1, SHA-256/392/512 etc.) and public key | encryption algorithms. |
the government for permission to publish his | encryption software, Snuffle, and a paper describing it |
ess keys can be protected by a wide range of | encryption and hashing algorithms provided by the libgc |
crypt files with a strong, readily available | encryption algorithm such that a low percentage (1% - 0 |
published articles on Export Restrictions on | Encryption became required reading at Harvard Law Schoo |
This information might then reveal the | encryption method used, some information about the encr |
CLEARAID automatically reversed the | encryption without having to contact the extortionist. |
Reversing password | encryption (e.g., to obtain a password to try against a |
hoosing the key length of the RSA public-key | encryption scheme. |
atible with containers used by SecuBox (disk | encryption software by Aiko Solutions) |
Secure File | Encryption |
In fact, certain artificial signature and | encryption schemes are known which are proven secure in |
XML Digital Signature and | encryption of Atom documents |
GP SDK which provides signing, verification, | encryption, and decryption of files. |
SMEG is an acronym for Simulated Metamorphic | Encryption Generator. |
Palcrypt is an open source single file | encryption and decryption program. |
ted using what was then the standard default | encryption mode, CBC. |
ryffen manages to alter Starkey's Department | encryption code, so Starkey is no longer on the run, an |
RSA standard that governs the storage and | encryption of private keys. |
Support for | encryption algorithm AES, Twofish, Serpent, including t |
branch added support for | encryption, peer exchange, binary prefix, and UPnP. |
TextCrypt, text | encryption. |
This is not the only attack that allows | encryption keys to be read from memory-for example, a D |
a product, typically a device that performs | encryption or secure transactions, is tampered with dur |
The Advanced | Encryption Standard algorithm (AES - derived from the R |
ware is also used as part of the CryptoStick | encryption device from Research Triangle Software, Inc. |
In cryptography, the Tiny | Encryption Algorithm (TEA) is a block cipher notable fo |
cryptographic library that has all the usual | encryption algorithms needed by information security so |
to the development process for the Advanced | Encryption Standard (AES)." |
d, in 1973, what has become known as the RSA | encryption algorithm, realising Ellis' idea. |
ng several ways to circumvent the VideoCrypt | encryption system, most notably the Season7 smartcard e |
on of cryptsetup, using dm-crypt as the disk | encryption backend. |
It was revealed that the Xtraview | Encryption System used to encrypt Red Hot could be bypa |
gn of LOKI and the cryptanalysis of the Data | Encryption Standard. |
s such that each block depends on the proper | encryption of the previous block. |
He worked for Network Associates on the PGP | encryption software, is a member of the Shmoo Group, a |
ipher which was a candidate for the Advanced | Encryption Standard, and he is one of the designers of |
grapher at GCHQ who invented the widely-used | encryption algorithm now commonly known as RSA, about t |
Cryptophane is a GUI frontend for the GnuPG | encryption software. |
GnuPG: the core; this is the actual | encryption tool |
Control over the SSH | encryption key and protocol version. |
Shamir and Leonard Adleman developed the RSA | encryption algorithm in 1977. |
FileVault-On the fly | encryption and decryption of a user's home folder |
If there's additional | encryption by SYSKEY in the imported SAM file (it's on |
rs/software developers and new users to file | encryption by combining strong encryption methods and a |
eBook publishers, Baen flatly refused to use | encryption or even Adobe's Portable Document Format (PD |
example, required security tokens, supported | encryption algorithms, and privacy rules) and how to as |
acking, budget management and tracking, file | encryption, and investment portfolio management. |
dm-crypt is a transparent disk | encryption subsystem in Linux kernel versions 2.6 and l |
t was the first open source transparent disk | encryption system to support Windows Vista and PDAs. |
4344, The Secure Shell (SSH) Transport Layer | Encryption Modes |
tates S1, S2 and S3) is generally unsafe, as | encryption keys will remain in the computer's memory, a |
If two parties use an | encryption system, which encrypts a message M of length |
blic Key Infrastructure (PKI) and the use of | encryption, Internet governance, intellectual property |
Some users of GmailFS use filesystem-level | encryption to protect the information they store with i |
However, the key used for | encryption is established using a Diffie-Hellmann Key E |
urce to the general public which used strong | encryption. |
This is used when | encryption is not a practical solution or in tandem wit |
tions, keeps no logs and uses military-grade | encryption to protect sources and other confidential in |
, Blowfish, Twofish, CAST, and various other | encryption methods. |
The Pro version uses | encryption and optional password protection to keep doc |
wn as web optimization or fast web viewing), | encryption, and decryption of PDF files. |
the first cryptanalyses of the WEP wireless | encryption protocol together with Ian Goldberg and Davi |
f who downloads or shares files, with strong | encryption to resist traffic sniffing. |
only available to authorised users with the | encryption keys. |
rotect PDF files during creation with 128/40 | encryption. |
ntext file is created and encrypted with the | encryption method under attack, such that the first cip |
vides great flexibility to the user with its | encryption options. |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |