Uploads
Contact
/
Login
Upload
Search Results for 'Data Encryption'
INF529: Security and Privacy
jane-oiler
Cryptography
phoebe-click
DSS Enterprise Authentication done right
natalia-silvester
Database and Cloud Security
tawny-fly
Enhancing File Data Security in Linux
briana-ranney
Systems Software Utilities and Backups
jane-oiler
Design and Implementation of Privacy‑Preserving
giovanna-bartolotta
Design and Implementation of Privacy‑Preserving
olivia-moreira
Cryptography Dr. X Outline
kittie-lecroy
Cryptography Resilient to Continual Memory Leakage
aaron
Secure and Privacy-Preserving
test
Information Systems Management
natalia-silvester
E-Mail Capturing & E-mail Encryption
liane-varnes
On Minimal Assumptions for Sender-Deniable Public Key Encry
calandra-battersby
Information and Computer Security
liane-varnes
Privacy, Security and Ethics
celsa-spraggs
Privacy in Online Social Networks
pamella-moone
Cloud Computing Security
natalia-silvester
Searchable Encryption Applied Cryptography
lois-ondreau
Attribute-Based Encryption With Verifiable Outsourced Decry
ellena-manuel
Symmetric-Key Cryptography
giovanna-bartolotta
Hourglass Schemes: How to Prove that Cloud Files Are Encrypted
liane-varnes
Spring 2017 • Lecture 23
yoshiko-marsland
SecureAge Technology and its Security Solution
jane-oiler
5
6
7
8
9
10
11
12
13
14
15