「ENCRYPTION」の共起表現一覧(2語右で並び替え)
該当件数 : 171件
PDF support includes transparency, | encryption and a large set of the PDF 1.4 spec as well |
End-to-end | encryption using a combination of Blowfish and RSA algo |
ion uses a 64-bit block cipher algorithm for | encryption and a proprietary compression algorithm. |
All protocols offer OpenSSL | encryption for additional security. |
Optional archive | encryption using AES (Advanced Encryption Standard) wit |
communication | encryption with AES, serpent, CAST-256, IDEA or Blowfis |
Support for | encryption algorithm AES, Twofish, Serpent, including t |
The Advanced | Encryption Standard algorithm (AES - derived from the R |
Voodoo's method of | encryption encrypts all transfers of data from the prog |
ission, which is to encrypt, using a digital | encryption key, all the files it finds on computer driv |
torage features such as backup and recovery, | encryption, deduplication and provisioning. |
les comprise logging functionality, Blowfish | encryption, user and channel management, away functiona |
virus control), personal firewall, antispam, | encryption, antispyware, and parental control. |
oftware development to security, a number of | encryption implementations and early static analysis to |
also claims to have written an "unbreakable" | encryption program, and made predictions for the year 2 |
ipher which was a candidate for the Advanced | Encryption Standard, and he is one of the designers of |
8 contained sophisticated communications and | encryption technology, and because portions of the debr |
password being examined (including both the | encryption algorithm and key), and comparing the output |
example, required security tokens, supported | encryption algorithms, and privacy rules) and how to as |
Control over the SSH | encryption key and protocol version. |
he US government allows the export of 56-bit | encryption software, and stronger encryption software f |
rates with Nautilus, gedit and Evolution for | encryption, decryption and other operations. |
the Data Protection API can enable symmetric | encryption of any kind of data; in practice, its primar |
In fact, certain artificial signature and | encryption schemes are known which are proven secure in |
plained that once the extension and filename | encryption tables are known, restoration is possible. |
XML Digital Signature and | encryption of Atom documents |
Internet users to trust one another through | encryption and authentication. |
, 2010: Acquired Mobile Armor; an innovative | encryption specialist based in St. Louis, Missouri, USA |
Alix proposed a controversial scheme for DRM | encryption of BBC content, which was the subject of a 4 |
Opportunistic | encryption can be used to combat passive wiretapping. |
d its receiver and then attempt to crack the | encryption key being used to secure wireless communicat |
As of June/2007, OpenPGP | encryption is being implemented. |
d 31 of the NLFSR state as its inputs during | encryption and bits 0, 8, 19, 25 and 30 during decrypti |
he bits of the NLFSR state (bits 0 and 16 on | encryption and bits 31 and 15 on decryption) and with a |
SecureIM is an | encryption system built into the Trillian Instant Messe |
n scrambling system was a form of television | encryption developed by Oak Industries in the early 198 |
atible with containers used by SecuBox (disk | encryption software by Aiko Solutions) |
easiest way to enable opportunistic website | encryption is by using self-signed certificates, but th |
phers that support single pass authenticated | encryption and can operate as collision-resistant hash |
ted using what was then the standard default | encryption mode, CBC. |
Fileystem | encryption has certain advantages and disadvantages ove |
FreeOTFE originally offered | encryption using cipher-block chaining (CBC) with encry |
rs/software developers and new users to file | encryption by combining strong encryption methods and a |
er, which was a finalist for NIST's Advanced | Encryption Standard competition (with Bruce Schneier, J |
ddy is a simple software application for the | encryption and compression of computer files to make th |
FreeOTFE is an open source on-the-fly disk | encryption (OTFE) computer program for PCs running Micr |
encryption of credit card information | |
compliance and regulatory agencies requiring | encryption for data at rest including, Health Insurance |
Encryption - Data stored by the service is encrypted. | |
rted features include resultset caching, SSL | encryption, custom data source, dbShield |
Building in Big Brother: The | Encryption Policy Debate (Editor), Springer-Verlag, New |
GP SDK which provides signing, verification, | encryption, and decryption of files. |
wn as web optimization or fast web viewing), | encryption, and decryption of PDF files. |
Palcrypt is an open source single file | encryption and decryption program. |
FileVault-On the fly | encryption and decryption of a user's home folder |
They also handled | encryption and decryption. |
It is an authenticated | encryption algorithm designed to provide both data auth |
his smart card, various cryptographic tasks ( | encryption, decryption, digital signing/verification, a |
of operation specifically designed for disk | encryption (see disk encryption theory). |
ouble Latte, Stock Options, Sea of Cubicles, | Encryption, Firewall, El Camino Real, The Sysadmin, and |
FOPE also offers policy-based | encryption of email messages. |
, which uses cloud computing and 128-bit SSL | encryption to enable users to send and receive large da |
However, the key used for | encryption is established using a Diffie-Hellmann Key E |
r private or public anonymous proxy servers, | encryption or even spoofing, diversion and obfuscation |
eBook publishers, Baen flatly refused to use | encryption or even Adobe's Portable Document Format (PD |
branch added support for | encryption, peer exchange, binary prefix, and UPnP. |
File | Encryption encrypts files and folders to secure from un |
rcial software program for "on the fly" disk | encryption (OTFE) for PC and PDA. |
Scramdisk is a free OTFE (On-The-Fly | Encryption) program for Windows 95, Windows 98 and Wind |
overy requirements for the use of asymmetric | encryption keys for security and authenticated transact |
BestCrypt is a commercial disk | encryption program for Windows and Linux, developed by |
ware is also used as part of the CryptoStick | encryption device from Research Triangle Software, Inc. |
ing down a computer will usually discard the | encryption keys from memory. |
blic Key Infrastructure (PKI) and the use of | encryption, Internet governance, intellectual property |
ess keys can be protected by a wide range of | encryption and hashing algorithms provided by the libgc |
CLEARAID automatically reversed the | encryption without having to contact the extortionist. |
in obscuring information about the choice of | encryption algorithm if that information is freely avai |
While most disk | encryption software implements different and incompatib |
dm-crypt is a transparent disk | encryption subsystem in Linux kernel versions 2.6 and l |
it was first presented at the Fast Software | Encryption workshop in Leuven in 1994, and first publis |
ration, such as XTS, LRW and ESSIV (see disk | encryption theory), in order to avoid watermarking atta |
Shamir and Leonard Adleman developed the RSA | encryption algorithm in 1977. |
ion, WS-Security Signatures, and WS-Security | Encryption and included Windows Keystore, Java Keystore |
It specifically targets the weaknesses of LM | encryption, and includes pre-computed data sufficient t |
It is similar in function to other disk | encryption programs including Microsoft's BitLocker. |
This weakness affected many disk | encryption programs, including older versions of BestCr |
ng attacks are practical against a number of | encryption algorithms, including RSA, ElGamal, and the |
tary of Defense for Policy, concentrating on | encryption and information assurance issues. |
acking, budget management and tracking, file | encryption, and investment portfolio management. |
He worked for Network Associates on the PGP | encryption software, is a member of the Shmoo Group, a |
eta-documents include: posting of asymmetric | encryption public keys, posting tokens that would be re |
s, distributed link tracking, and file-level | encryption, also known as the Encrypting File System (E |
GPG | Encryption with Kryptonite plugin |
premium version of CRT with support for SSH | encryption, SecureCRT later replaced the CRT product en |
DirecTV transmits programming with | encryption to mitigate signal piracy. |
ng several ways to circumvent the VideoCrypt | encryption system, most notably the Season7 smartcard e |
Yet, it does make the | encryption of most internet traffic easy to implement, |
cryptographic library that has all the usual | encryption algorithms needed by information security so |
quipment such as network management systems, | encryption and networking solutions for internet connec |
rch areas including mathematics, statistics, | encryption algorithms, neural networks, geophysics and |
This is used when | encryption is not a practical solution or in tandem wit |
grapher at GCHQ who invented the widely-used | encryption algorithm now commonly known as RSA, about t |
servers receives another share of K and the | encryption result of M using the key K , E(M,K). |
Instant messaging | encryption with Off-the-Record Messaging |
It is also known for a series of high-speed | encryption co-processors, offloading this processor-int |
1960s-era | encryption systems often included a punched card reader |
The Pro version uses | encryption and optional password protection to keep doc |
It uses 256-bits AES | encryption in order to encrypt messages, thus ensuring |
Most disk | encryption systems overwrite their cached encryption ke |
esented in the paper Fast Hashing and Stream | Encryption with PANAMA on the Fast Software Encryption |
ate, then uses this state to perform a block | encryption using part of the key, and uses the result o |
RSA standard that governs the storage and | encryption of private keys. |
tions, keeps no logs and uses military-grade | encryption to protect sources and other confidential in |
Some users of GmailFS use filesystem-level | encryption to protect the information they store with i |
d, in 1973, what has become known as the RSA | encryption algorithm, realising Ellis' idea. |
Opportunistic | Encryption (OE) refers to any system that, when connect |
Protecting the stored values (e.g., using | encryption and replicated storage). |
hat two advanced features, disk-spanning and | encryption, still require PKZIP. |
published articles on Export Restrictions on | Encryption became required reading at Harvard Law Schoo |
f who downloads or shares files, with strong | encryption to resist traffic sniffing. |
Many "home grown" | encryption algorithms reveal the key quite easily when |
mpany announced that it would soon offer SSL | encryption for search (although not enabled by default) |
a product, typically a device that performs | encryption or secure transactions, is tampered with dur |
The service makes use of AES | encryption for security, and uses data compression and |
r Apple Mail that provides public key e-mail | encryption and signing. |
It is a form of disk | encryption software similar to Microsoft's Encrypting F |
wer trace from a smart card performing a DES | encryption, the sixteen rounds can be seen clearly. |
The channel also dropped its Videoguard | encryption on Sky Digital on 1 July 2005, switching to |
the government for permission to publish his | encryption software, Snuffle, and a paper describing it |
ryffen manages to alter Starkey's Department | encryption code, so Starkey is no longer on the run, an |
I, and cloud storage), data compression, and | encryption, with specific support for Microsoft SharePo |
novated in a variety of areas, including RSA | encryption, the spreadsheet, the NuBus, the X Window Sy |
ased access control to information, and full | encryption of stored information and communications bet |
crypt files with a strong, readily available | encryption algorithm such that a low percentage (1% - 0 |
Mechanical | encryption devices such as Enigma made these attacks mu |
Unlike other Linux | encryption solutions such as dm-crypt, eCryptfs uses Fi |
If there's additional | encryption by SYSKEY in the imported SAM file (it's on |
PGP Virtual Disk is an on-the-fly | encryption (OTFE) system that allows one to create a vi |
Encryption of system and bootable partitions with pre-b | |
nearly impossible to stop the use of strong | encryption for telephone communications. |
on of the RSA Secret-Key Challenge, a 56-bit | encryption algorithm that had a $10,000 USD prize avail |
For coding for DRGs first | encryption to the valid version of the ICD-10-GM is (cu |
In addition the | encryption using the AES 128 standard has been introduc |
ing all the processing, mixing, encoding and | encryption on the clients, relieving the servers and in |
s such that each block depends on the proper | encryption of the previous block. |
If there is end-to-end | encryption between the sender and the recipient, then n |
er's logon secrets, or in the case of system | encryption, using the system's domain authentication se |
Encryption for the Masses (E4M) is a free disk encrypti | |
Ciright platform incorporates 512 bit | encryption at the device level. |
upports a unique type of system for wireless | encryption using the powerful wpa supplicant. |
ernet with computers aiding the users in the | encryption of their interactions. |
obtaining a password (either by cracking the | encryption, or through social engineering). |
Reversing password | encryption (e.g., to obtain a password to try against a |
10.6) with software tools for email and file | encryption (similar to Gpg4win for Windows). |
This is not the only attack that allows | encryption keys to be read from memory-for example, a D |
e wiretapper, on the other hand, can disrupt | encryption negotiation to force an unencrypted channel. |
t was the first open source transparent disk | encryption system to support Windows Vista and PDAs. |
the first cryptanalyses of the WEP wireless | encryption protocol together with Ian Goldberg and Davi |
ntext file is created and encrypted with the | encryption method under attack, such that the first cip |
It was revealed that the Xtraview | Encryption System used to encrypt Red Hot could be bypa |
This information might then reveal the | encryption method used, some information about the encr |
cure communication improvements (signing and | encryption of user-defined SOAP headers, Kerberos Secur |
IBM - IBM Database | Encryption Expert uses Vormetric encryption technology |
ection, intrusion prevention, email and file | encryption, firewalls, VPNs, vulnerability, and scannin |
This | encryption system was discontinued by the mid-1990s in |
sp supports image checksumming, compression, | encryption as well as integration with Splashy. |
, a watermarking attack is an attack on disk | encryption methods where the presence of a specially cr |
If two parties use an | encryption system, which encrypts a message M of length |
tates S1, S2 and S3) is generally unsafe, as | encryption keys will remain in the computer's memory, a |
ned by aspects of WS-Security, including XML | Encryption and XML Digital Signatures. |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |