Encryption White
Papers (531 papers) |
| |
|
| |
Featured White Papers |
| 1. |
The
Secure Sockets Layer Protocol – Enabling Secure
Web Transactions |
| 2. |
Privacy
and Security in Business Use of the
Internet |
| |
|
| |
White Paper Titles |
| 3. |
A
Practical Guide to the Right VPN
Solution |
| 4. |
Statistical
Identification of Encrypted Web Browsing
Traffic |
| 5. |
VeriSign
Digital Trust Services: Enabling Trusted Web
Services |
| 6. |
A
Lower Bound for Multicast Key
Distribution |
| 7. |
A
Technical Introduction to Digital
Signatures |
| 8. |
Access
Control Programmer's Guide |
| 9. |
Access
Management and Dynamic Relationships Between Users
and Information |
| 10. |
AES
Key Agility Issues in High-Speed IPsec
Implementations |
| 11. |
Ampliflied
Boomerang Attacks Against Reduced-Round MARS and
Serpent |
| 12. |
An
Introduction to Cryptography and Digital
Signatures |
| 13. |
API
Level Attacks on Embedded Systems |
| 14. |
API-Level
Attacks on Embedded Systems |
| 15. |
AppGate
Client & Server Version 4.0 Technical White
Paper |
| 16. |
Are
We Eliminating Complexity or Transliterating
It? |
| 17. |
Authorization:
Unified Privilege Management Solutions for Secure
e-Business |
| 18. |
Beyond
Encryption: Rule #1: Don't put Your Head in a
Noose |
| 19. |
Biometrics
and Cryptography: Match On Card Paves the Way to
Convenient Security |
| 20. |
CKM
® Technology Overview |
| 21. |
Comparing
Cylink Products and Security Add-Ons to Network
Products |
| 22. |
Conditional
and User Specific Access to Services and Resources
Using Annotation Watermarks |
| 23. |
CrypKey
Licensing |
| 24. |
Cryptographic
Modes of Operation for the Internet |
| 25. |
CryptoWorks
Fine Grain Conditional Access: Protection of
Broadcast Content in IP Multicasting
Networks |
| 26. |
Datacard
MAP Architecture |
| 27. |
Datacard®
Smart Card Personalization Manager |
| 28. |
Digital
Signature Requirements and DB Sign Data Security
Suite |
| 29. |
Efficient
Algorithms for Computing Differential Properties
of Addition |
| 30. |
Electronic
Signatures vs. Digital Signatures |
| 31. |
EMERALD's
Component-Based Approach to Network
Security |
| 32. |
Encrypted
E-mail: Close One Door, Open Another |
| 33. |
Encrypted
Tunnels using SSH and MindTerm |
| 34. |
Encrypting
Virtual Memory |
| 35. |
Encryption
Fundamentals |
| 36. |
Encryptonite
System White Paper |
| 37. |
Enforcing
Formal Security Properties |
| 38. |
Financial
Cryptography 2001 E-Voting Panel: The Business of
Electronic Voting |
| 39. |
Freedom
2.1 Security Issues and Analysis |
| 40. |
Getting
a Grip on Access Control Terms |
| 41. |
Getting
Commerce-Ready with NuSphere and PHP |
| 42. |
High-Speed
Rijndael Encryption/Decryption
Processors |
| 43. |
How
to Steal Streaming Media |
| 44. |
Identity
Based Encryption from the Weil Pairing |
| 45. |
Improved
Cryptanalysis of Rijndael |
| 46. |
Initial
Cryptanalysis of the RSA SecurID
Algorithm |
| 47. |
Introduction
to Encryption and Digital Signatures |
| 48. |
Introduction
to Public-Key Cryptography |
| 49. |
Key
Operations as a Network Service |
| 50. |
Linux
2.4: Next Generation Kernel Security |
| 51. |
Low-Speed
Rijndael Encryption/Decryption
Processors |
| 52. |
Managed
Security Monitoring: Network Security for the 21st
Century |
| 53. |
Multi-Grade
Cryptography |
| 54. |
NDMP
Support in NetWorker 6 |
| 55. |
Network
Attack and Defense |
| 56. |
Not
So Secret Passwords |
| 57. |
Planning
and Installing a Windows 2000 Remote Access VPN
Server |
| 58. |
Privacy:
Our Two Cents |
| 59. |
Random
Number Generation |
| 60. |
Saecos
Security Best Practices: Authentication and
Authorization |
| 61. |
SC-CFS:
Smartcard Secured Cryptographic File
System |
| 62. |
Secure
and Invisible Data Hiding in 2-Color
Images |
| 63. |
Secure
Backup and Application Access for ASPs |
| 64. |
Secure
Data Center Access: Authentication and
Encryption |
| 65. |
Security
Services Markup Language |
| 66. |
SEG-
A Provably Secure Variant of El-Gamal |
| 67. |
Seven
Steps to Digital Signature
Implementation |
| 68. |
Sigaba
Technology Technical White Paper |
| 69. |
SSL
Is Not a Magic Bullet |
| 70. |
StealthKey™
Management and the SKP-100 Security
Processor |
| 71. |
Strengthening
Netegrity SiteMinder Authentication |
| 72. |
Tamper
Resistance - a Second Opinion |
| 73. |
The
Complexities of Viral VB Scripts |
| 74. |
The
Differences Between ANSI X9.31 and RSA
PKCS#1 |
| 75. |
The
New hp Benchmark for Measuring Encrypted
Transactions |
| 76. |
The
Widevine Cypher™ Cryptosystem |
| 77. |
Time
Synchronization and Windows 2000 Active
Directory |
| 78. |
Timed-Release
Cryptography |
| 79. |
Tivoli
Storage Manager—Adaptive Sub-file Differencing and
Encryption for Mobile and Remote Clients |
| 80. |
Understanding
the Raw Materials of the Internet |
| 81. |
Using
SSH Tunneling |
| 82. |
Verifiable,
Secret Shuffles of ElGamal Encrypted Data for
Secure Multi-Authority Elections |
| 83. |
Windows
2000 Server and Key Management Server
Interoperability |
| 84. |
Windows
PGP (Pretty Good Privacy) ASCII Armor Parser
Vulnerability |
| 85. |
XML
Encryption Requirements |
| 86. |
µ
ASN.1 Whitepaper |
| 87. |
A
Backgrounder to Securing Your Internet
Connection |
| 88. |
A
Chosen Ciphertext Attack against Several E-Mail
Encryption Protocols |
| 89. |
A
Cryptographic Evaluation of IPsec |
| 90. |
A
Networking Industry White Paper on Encryption
Export Controls |
| 91. |
A
Pocketful of Keys |
| 92. |
A
Technical Introduction to Private
Credentials |
| 93. |
Advanced
Encryption Standard (AES) Perspective and
Strategies |
| 94. |
Amplified
Boomerang Attacks Against Reduced-Round MARS and
Serpent |
| 95. |
An
Introduction to BEA WebLogic® Server
Security |
| 96. |
An
Open-source Cryptographic Coprocessor |
| 97. |
Atlas
Encryption |
| 98. |
Basic
Elements of a PKI |
| 99. |
Best
Practices: The Key to Ultimate Trust! |
| 100. |
Bypassing
Secure Web Transactions via DNS
Corruption |
| 101. |
Can
Cryptography Prevent Computer Viruses? |
| 102. |
Can
Pseudonymity Really Guarantee Privacy? |
| 103. |
Certificate
Revocation: When Not to Trust |
| 104. |
Communications
Security in an All-IP World |
| 105. |
Competitive
Performance Testing of IPSec Encryption (3DES)
Capable Ethernet Adapters |
| 106. |
Conducting
a Universally Verifiable Electronic Election Using
Homomorphic Encryption |
| 107. |
Crypto
101 |
| 108. |
Cryptographic
Acceleration Secures eCommerce, Enhances Server
Performance |
| 109. |
Cryptography
and Security |
| 110. |
Data
Encryption Standard (DES) Implementation on the
TMS320C6000 |
| 111. |
Data
Encryption using DES/Triple-DES Functionality in
Spartan-II FPGAs |
| 112. |
Digital
Signature Standard (DSS) |
| 113. |
Digital
Transmission Content Protection |
| 114. |
DSA
and RSA Key and Signature Encoding for the KeyNote
Trust Management System |
| 115. |
DSL
Security |
| 116. |
E-Signatures:
Progress with Weak Security? |
| 117. |
Elliptic
Curve Cryptography Support in Entrust |
| 118. |
Encrypting
File System for Windows 2000 |
| 119. |
Execution
Control Lists: an Approach to Defending Against
New and Unknown Malicious Software |
| 120. |
Expressive
or Functional? Encryption Algorithms as Protected
First Amendment Speech |
| 121. |
Fast...And
Secure |
| 122. |
Freedom
2.0 Mail System |
| 123. |
Frequently
Asked Questions About Today's
Cryptography |
| 124. |
HTTP
Over TLS |
| 125. |
Improving
Smartcard Security Using Self-Timed Circuit
Technology |
| 126. |
Integrity
of Inter-Enterprise Information Exchange –
Viquity’s Unique Security Infrastructure |
| 127. |
Internet
Voting Security |
| 128. |
Introduction
to PKI |
| 129. |
Is
Your Wide Area Network Really Secure? |
| 130. |
Issuing
and Validating Certificates to Reduce Web
Transaction Risk |
| 131. |
Key
Agility in MARS |
| 132. |
KeyGrab
T00 - the Search for Keys Continues.. |
| 133. |
Make
Your Software Behave: Cryptography
Essentials |
| 134. |
Make
Your Software Behave: Everything to Hide |
| 135. |
Make
Your Software Behave: Tried and True
Encryption |
| 136. |
MARS
and the AES Selection Criteria |
| 137. |
MindTerm
Documentation |
| 138. |
Networks
+ Cryptography = Electronic Commerce. What's
Missing? |
| 139. |
Novell's
Weak Remote Access Password Encryption
Algorithm |
| 140. |
Overview
of Certification Systems: X.509, PKIX, CA, PGP
& SKIP |
| 141. |
Password
Management Best Practices |
| 142. |
Persistence
Mechanisms: Enabling Today’s Dynamic e-Business
Transactions |
| 143. |
Planning
for FIPS 140-2 -- an Evolution of Security
Requirements |
| 144. |
Preliminary
Cryptanalysis of Reduced-Round |
| 145. |
Reasoning
about Accountabilities in Cryptographic Protocols
for E-Commerce Using a Generic Belief
Logic |
| 146. |
Remarks
on the Security of the Elliptic Curve
Cryptosystem |
| 147. |
S2ML
(Security Services Markup Language) |
| 148. |
Secure
Coprocessor Integration with Kerberos V5 |
| 149. |
Secure
Internet Smartcards |
| 150. |
Securing
Multiple Web Servers |
| 151. |
Security
and Productivity Improvements – Sufficient for the
Success of Secure Electronic
Transaction? |
| 152. |
Security
Versus Compatibility in Online Elections |
| 153. |
Self-Study
Course in Block Cipher Cryptanalysis |
| 154. |
Shibboleth:
Private Mailing List Manager |
| 155. |
Side
Channel Cryptanalysis of Product Ciphers |
| 156. |
Software
Security for Developers: One-time Pads |
| 157. |
Solsoft
NP: Putting Security Policies into
Practice |
| 158. |
SSH
IPSEC Express Toolkit: Integration with Customer
Applications |
| 159. |
SSL
Primer |
| 160. |
SSL
Theory and Practice |
| 161. |
Step-by-Step
Guide to Encrypting File System (EFS) |
| 162. |
Ten
Risks of PKI: What You're Not Being Told about
Public Key Infrastructure |
| 163. |
The
Added Value of EMBASSY in the Digital
World |
| 164. |
The
Concept of Trust in Network Security |
| 165. |
The
Correctness of Crypto Transaction Sets |
| 166. |
The
Design and Verification of a Cryptographic
Security Architecture |
| 167. |
The
End of SSL and SSH? |
| 168. |
The
Enduring Value of Symmetric Encryption |
| 169. |
The
MAOS Trap |
| 170. |
The
Pre-Encryption Fallacy |
| 171. |
The
XML Security Suite: Increasing the Security of
e-Business |
| 172. |
Tracking
Digital Signatures |
| 173. |
Transitive
Signature Schemes |
| 174. |
Two
Remarks on Public Key Cryptology |
| 175. |
Upgrading
to TLS Within HTTP/1.1 |
| 176. |
Using
nCipher Hardware to Secure Your Identrus
Infrastructure |
| 177. |
Using
SSL as an Encryption Tool |
| 178. |
Using
Win2000's Foolproof Encryption |
| 179. |
Virtual
Private Networks |
| 180. |
VPNs:
Performance, Security and Management for
All |
| 181. |
What's
'E' About Signatures? |
| 182. |
When
an E-Signature is Not a Signature |
| 183. |
Your
Surest Path to AES |
| 184. |
1999
Crypto Year-in-Review |
| 185. |
A
Calculus for Cryptographic Protocols |
| 186. |
A
Current Perspective on Encryption
Algorithms |
| 187. |
Addition
of Kerberos Cipher Suites to Transport Layer
Security (TLS) |
| 188. |
Adopting
Single Sign-On for NDS |
| 189. |
An
Introduction to WebLogic Server: Security Features
and Benefits of the WebLogic Server |
| 190. |
An
Overview of Cryptography |
| 191. |
Analysis
of the Internet Key Exchange Protocol Using the
NRL Protocol Analyzer |
| 192. |
ANS
White Paper: Implementation of Encryption Export
Policy ‘99 |
| 193. |
Applying
Communicator's Security Features |
| 194. |
Are
Strong Primes Needed for RSA? |
| 195. |
Biometric
Decision Landscapes |
| 196. |
Bluetooth
Security Architecture Version 1.0 |
| 197. |
Brute
Force Attack on UNIX Passwords with SIMD
Computer |
| 198. |
Building
Intrusion Tolerant Applications |
| 199. |
Certificate
Authority Root Key Protection: Recommended
Practices |
| 200. |
Copy
Protection for DVD Video |
| 201. |
Cost
Profile of a Highly Assured, Secure Operating
System |
| 202. |
Cryptanalysis
of Contents Scrambling System |
| 203. |
Cryptanalysis
of Magenta |
| 204. |
Cryptanalysis
of Microsoft's PPTP Authentication Extensions
(MS-CHAPv2) |
| 205. |
Cryptanalysis
of Microsoft's PPTP Authentication Extensions
(MS-CHAPv2) |
| 206. |
Crypto
Across the Enterprise |
| 207. |
Cryptographic
Verification of Test Coverage Claims |
| 208. |
Cryptography
is Not the Ultimate Solution |
| 209. |
Data
Encryption Standard (DES) |
| 210. |
Data
Encryption Techniques |
| 211. |
Discrete
Logarithms: the Past and the Future |
| 212. |
DVD
Encryption Hacked |
| 213. |
Encryption
- Getting started: Algorithms and Keys |
| 214. |
Encryption
and Law Enforcement |
| 215. |
Encryption
of Long Blocks Using a Short-Block Encryption
Procedure |
| 216. |
Encryption
White Paper |
| 217. |
Export
Controls on “Recoverable” Products under the
Export Administration Regulations |
| 218. |
How
SSL Works |
| 219. |
Improved
Analysis of Some Simplified Variants of
RC6 |
| 220. |
International
Cryptography |
| 221. |
Managing
Network Security; The Limits of
Cryptography |
| 222. |
MARS
- a Candidate Cipher for AES |
| 223. |
Minimizing
Bandwidth for Remote Access to Cryptographically
Protected Audit Logs |
| 224. |
On
the Construction of Variable-Input-Length
Ciphers |
| 225. |
Overview
of Current Developments in International
Cryptography Regulation |
| 226. |
Partnerships
Accelerate Service Deployment In
Telecoms |
| 227. |
Platforms
& Infrastructure: Protect Guards Laptop and
Desktop Data |
| 228. |
Privacy
in the Digital Age: Encryption Policy - A Call for
Congressional Action |
| 229. |
Protecting
Secret Keys with Personal Entropy |
| 230. |
Reaction
Attacks Against Several Public-Key
Cryptosystems |
| 231. |
Recent
Results on Signature Forgery |
| 232. |
Risks
of Relying on Cryptography |
| 233. |
Round
Three: Encryption Software & Export
Controls |
| 234. |
Secure
Key Recovery |
| 235. |
Secure
Virtual Private Networks for Enterprise |
| 236. |
Security
in the Real World: How to Evaluate
Security |
| 237. |
Smart
Cards and Network Security |
| 238. |
Smart
Cards in Your Security Future |
| 239. |
Smart
Cards White Paper |
| 240. |
Software
Smart Cards via Cryptographic Camouflage |
| 241. |
Some
Non-Random DES Characteristics and an
Identification Attack on DES |
| 242. |
SSH
X.509 Certificate Tools |
| 243. |
The
Beer Bottle Cipher |
| 244. |
The
Design of a Cryptographic Security
Architecture |
| 245. |
The
INTEL® Random Number Generator |
| 246. |
The
TLS Protocol |
| 247. |
Twenty
Years of Attacks on the RSA Cryptosystem |
| 248. |
Unicity,
DES Unicity, Open-Keys, Unknown-Keys |
| 249. |
Using
Public Key Digital Signatures in Paperless
Information Systems |
| 250. |
Why
Crypto-Control Will Fail |
| 251. |
Why
Cryptosystems Fail |
| 252. |
Why
Johnny Can't Encrypt: A Usability Evaluation of
PGP 5.0 |
| 253. |
Are
'Strong' Primes Needed for RSA? |
| 254. |
Big
Brother in the Wires: Wiretapping in the Digital
Age |
| 255. |
Cryptanalytic
Attacks on Pseudorandom Number
Generators |
| 256. |
Evaluating
the Cost of Ownership for Digital Certificate
Projects |
| 257. |
Implementation
of a Provably Secure, Smartcard-based Key
Distribution Protocol |
| 258. |
Key
Update and the Complete Story on the Need for Two
Key Pairs |
| 259. |
LOUIS
Cryptography Support |
| 260. |
Network
Management on the Web (NeMoW) with
Tonics |
| 261. |
Novell
Certificate Extension Attributes: Novell Security
Attributes |
| 262. |
Reduced
Ideals in Function Fields |
| 263. |
SKIPJACK
and KEA Algorithm Specifications |
| 264. |
Smartcard
Integration with Kerberos V5 |
| 265. |
A
Cryptographic Checksum for Integrity
Protection |
| 266. |
A
Method for Protecting Copyright on
Networks |
| 267. |
A
New Family of Authentication Protocols |
| 268. |
A
PKI Primer - Public Key Cryptography: Public and
Private Keys and Digital Signatures |
| 269. |
A
Practical Introduction to the Dallas Semiconductor
iButton |
| 270. |
A
Short History of Cryptography |
| 271. |
Access
Management and PKI: Two Worlds Becoming
One |
| 272. |
ActivCard
Synchronous Authentication |
| 273. |
Advances
in Cryptography - ECC, Future Resiliency, and High
Security Systems |
| 274. |
Alternate
Representations of the Public Key Cryptography
Standards (PKCS) Using S-Expressions |
| 275. |
An
Introduction to IP Security (IPSec)
Encryption |
| 276. |
An
Introduction to PKI |
| 277. |
An
Introduction to Steganography |
| 278. |
Analog
Devices' Mixed-Signal Processors Enable a Novel
Solution for Secure Communications |
| 279. |
Another
Modification of a Fast Cryptographic
Checksum |
| 280. |
Authentication |
| 281. |
Authentication
Metric Analysis and Design |
| 282. |
BabylonMETA:
Introducing a Revolutionary Encryption
Device |
| 283. |
Basic
Elements of Quantum Information
Technology |
| 284. |
Benefits
of Using VPN Technology |
| 285. |
Biometric
Encryption™ |
| 286. |
Building
an E-Commerce Trust Infrastructure |
| 287. |
Building
the InfraStructure for Secure Electronic
Commerce |
| 288. |
Card
Security and Cryptography |
| 289. |
CAs:
the Business Opportunity |
| 290. |
Cellular
Automata Transform (CAT) - Data Compression and
Encryption Using Cellular Automata
Transforms |
| 291. |
Central
Policy Mediation for Information Sharing |
| 292. |
Certificate
Management Standards |
| 293. |
Check
Point VPN-1 Accelerator Card |
| 294. |
CIFS
Authentication and Security |
| 295. |
Cisco
IOS Software Feature: Network-Layer
Encryption |
| 296. |
Client
Puzzle Protocol: Cryptographic Defense against
Connection Depletion |
| 297. |
Columbitech
Wireless Platform Security |
| 298. |
Comments
on the ir-File Electronic Tax Filing
System |
| 299. |
Comparison
of Windows 2000 & WinVista S to Infinity: Data
Protection & Encryption
Functionality |
| 300. |
Computers:
the British Answer to the German Enigma
Machines |
| 301. |
CONNECT:
Enterprise and Secure FTP - the Revolution is
ON |
| 302. |
Copy
Protection Framework for DVD Audio |
| 303. |
Cross-certification
and PKI Policy Networking |
| 304. |
Cryonics,
Cryptography, and Maximum Likelihood
Estimation |
| 305. |
Cryptanalysis
of Microsoft's Point-to-Point Tunneling Protocol
(PPTP) |
| 306. |
Crypto
in Europe - Markets, Law and Policy |
| 307. |
Crypto
Tutorial |
| 308. |
Cryptographic
Acceleration with Radware’s CertainT Series 100 -
SSL Accelerator |
| 309. |
Cryptographic
File System for Unix |
| 310. |
Cryptographic
Security and Key Management Systems - the nFast/KM
Solution |
| 311. |
Cryptography
and PKI Basics |
| 312. |
Cryptography
and the Internet |
| 313. |
Cryptography
in a Hole - Cryptographic Service
Providers |
| 314. |
Cryptography
in WAP |
| 315. |
Cryptography
Policy and the Information Economy |
| 316. |
Cryptography
Standards and Infrastructure for the Twenty-First
Century |
| 317. |
Cryptomathic's
Java Cryptographic Service Provider |
| 318. |
CyberSafe
Public Key Solution: TrustBroker Virtual Smart
Card Option v1.0 |
| 319. |
Data
and Computer Security |
| 320. |
Datacryptor
2000 Key Management: Secure and Automated
Encryption for Wide Area Networks (WANS) |
| 321. |
Demystifying
VPN |
| 322. |
Deploying
a Public Key Infrastructure for Microsoft Exchange
5.5 |
| 323. |
DES
Encryption, CryptoCom V.34 |
| 324. |
DES
Key Search Project |
| 325. |
Designing
a Secured Website: What You Need to Know about SSL
Benchmarking |
| 326. |
Detecting
Stepping Stones |
| 327. |
DICA
Network Security Product Line Encryption |
| 328. |
Differential
Power Analysis |
| 329. |
Digipass
Controller |
| 330. |
Digipass
Deployment Procedures |
| 331. |
Digital
Certificates & Encryption |
| 332. |
Digital
Images Multiresolution Encryption |
| 333. |
Digital
Signatures and Certificates |
| 334. |
Digital
Signatures: The Key to Information Technology
Security |
| 335. |
Discrete
Logarithm Problem on Elliptic Curves of Trace
One |
| 336. |
Discrete
Logarithm Problem on Elliptic Curves of Trace
One |
| 337. |
Distribution
of the Prime Factors of p+d |
| 338. |
DIVA
Computer Evidence: Digital Image Verification and
Authentication |
| 339. |
E-mail
Encryption: What It is and Why You Need It
(FirstVPN) |
| 340. |
Electronic
Signatures - Signing up to the Digital
Economy |
| 341. |
Elliptic
Curve Cryptography |
| 342. |
Elliptic
Curve DSA (ECDSA): An Enhanced DSA |
| 343. |
Elliptic
Curves - a New Generation of Public Key
Techniques |
| 344. |
Email
and the Internet |
| 345. |
Email
Encryption: What It Is and Why You Need
It |
| 346. |
Embedded
Intel Architecture in Virtual Private Network
Design |
| 347. |
Embedded
Router Encryption |
| 348. |
Enabling
Trust in SSL Transactions |
| 349. |
Encoding
Hypermedia Applications with HyTime: The MIPS
Approach |
| 350. |
Encrypting
ATM Firewall |
| 351. |
Encryption
and Digital Certificates |
| 352. |
Encryption
of Information - Internet Data Transmission
Security |
| 353. |
Encryption:
Answering the Market Need |
| 354. |
End-to-end
Protection of Data |
| 355. |
Ensuring
Secure Data Transfer with Encryption |
| 356. |
Enterprise
Encryption and Access Control for Laptops and
Workstations |
| 357. |
Entry-Level
Communications Appliance for Security: Effect of
Network Configuration on Performance |
| 358. |
Establishing
a Security Process that Works |
| 359. |
Evaluation
Protocol: PC Based Encryption Solutions |
| 360. |
Explaining
Encryption |
| 361. |
Exploring
DB2 Data Access via Web and Internet |
| 362. |
Export
of Cryptography |
| 363. |
Extended
Security Interface and Kerberos in PATROL
V3.3 |
| 364. |
F-Secure
Integration for Unicenter TNG |
| 365. |
File
Gateway Product Overview |
| 366. |
Finding
Your Way Through the VPN Maze |
| 367. |
Firewall
OEM Uses of CyberSoft Technology |
| 368. |
Firewalls
and Virtual Private Networks |
| 369. |
Foundations
of Enterprise Network Security |
| 370. |
Frame
Relay Key Management |
| 371. |
Free
Space Optical Transmission Security |
| 372. |
Gemini
Trusted VPN & Trusted VPDN |
| 373. |
General
Cryptographic Knowledge |
| 374. |
Gigabit
SSL and Beyond |
| 375. |
Government:
Extranet VPN for Cheque Distribution to Regional
Data Centres |
| 376. |
Grictraveler
3.0 Roaming Applications |
| 377. |
Growing
Development of Foreign Encryption Products in the
Face of U.S. Export Regulations |
| 378. |
Hardware
Encryption Modules |
| 379. |
High
Performance Network Security Methods: Comparisons
and Case Studies |
| 380. |
How
Do Digital Time-Stamps Support Digital
Signatures? |
| 381. |
How
Electronic Encryption Works and How it Will Change
Your Business |
| 382. |
How
to Break Netscape's Server Key
Encryption |
| 383. |
How
to Develop a Network Security Policy: An Overview
of Internetworking Site Security |
| 384. |
How
to Recover Private Keys for Microsoft Internet
Explorer, Internet Information Server, Outlook
Express, and many Others |
| 385. |
Human
Memory and the Graphical Password |
| 386. |
IBM
Mobile Connect and Security |
| 387. |
Identity
Confirmed |
| 388. |
Improving
the Efficiency and Reliability of Digital
Time-Stamping |
| 389. |
Innovation.
E-Business. Decision Data. |
| 390. |
Institutional
Directory Deployment Proposal |
| 391. |
Intel
Internet Exchange Architecture |
| 392. |
Intellectual
Preservation and Electronic Intellectual
Property |
| 393. |
InterLynx/S:
A Great Solution for American Produce |
| 394. |
Internet
Commerce |
| 395. |
Internet
Security |
| 396. |
Introducing
the KeyGen ASK |
| 397. |
Introduction
to Encryption |
| 398. |
Introduction
to Public Key Cryptography |
| 399. |
Key
Escrow vs Key Recovery |
| 400. |
Key
Fragmentation for High Level Digital Signature
Security |
| 401. |
Key
Management in an Encrypting File System |
| 402. |
L2TP/IPSEC
with Windows 2000 Client and Server |
| 403. |
LASAT
SafePipe™ VPN |
| 404. |
Latest
Generation Technology for Immobilizer
Systems |
| 405. |
Liability
and Computer Security: Nine Principles |
| 406. |
MailGuardian
Delivers Transparent Security to Users |
| 407. |
MailRecall:
Control and Protect E-mail Messages |
| 408. |
Making
an Empty Promise with a Quantum Computer |
| 409. |
Memory
Protection for Networked Embedded
Systems |
| 410. |
Microsoft
Windows 2000 Public Key Infrastructure |
| 411. |
MiniPASS:
Authentication and Digital Signatures in a
Constrained Environment |
| 412. |
Murphy's
Law and Computer Security |
| 413. |
Netscape
Exportable 128-bit SSL Software |
| 414. |
Novell
Modular Authentication Services |
| 415. |
Novell:
BorderManager Authentication Service |
| 416. |
NSS:
The NTRU Signature Scheme |
| 417. |
NTRU:
A Ring Based Public Key Cryptosystem |
| 418. |
Online
Resources Information Security |
| 419. |
Packetized
SSL - Web Content Delivery Moves Toward Andes
Networks’ Packetized SSL |
| 420. |
Packetized
SSL — Understanding the Advantage |
| 421. |
Panda
Security for Windows 95/98 Technical
Supplement |
| 422. |
Password
Security Guidelines |
| 423. |
Passwords:
Security Weaknesses & User
Limitations |
| 424. |
PATROL®
7 Security Implementation: Securing the Data in
Your PATROL - Managed Environment |
| 425. |
Payment
Protocols: Cache on Demand |
| 426. |
Permission
Headers and Contract Law |
| 427. |
PKA
- Private Key Access |
| 428. |
PKI
- A Technology or a Hype Too Far? |
| 429. |
Playing
Hide and Seek with Stored Keys |
| 430. |
Polynomial
Rings and Efficient Public Key
Authentication |
| 431. |
Polynomial
Rings and Efficient Public Key Authentication
II |
| 432. |
PPTP
Security Issues - In Defense of PPTP |
| 433. |
Privacy
Concerns Increase |
| 434. |
Protecting
Stored Data with F-Secure FileCrypto |
| 435. |
Protecting
Your Private Key |
| 436. |
Public
Key Cryptography |
| 437. |
Public
Key Cryptography in Vordel Products |
| 438. |
Public
Key Distribution using Directory
Services |
| 439. |
Public
Key Encryption Systems - A Primer |
| 440. |
Public
Key-Based User Authentication |
| 441. |
Quantum
Cryptography - the Unbreakable Code |
| 442. |
Quantum
Cryptology |
| 443. |
Radicchio
Guidelines for Secure m-Business |
| 444. |
Risk
Management Using Threshold RSA
Cryptosystems |
| 445. |
Risks
of Key Recovery, Key Escrow, and Trusted
Third-Party Encryption |
| 446. |
Robustness
Principles for Public Key Protocols |
| 447. |
SafeWord
and Web Plug-Ins Support |
| 448. |
Scale
to Unlimited Users with the SafeWord Domain
Feature |
| 449. |
Secure
AS/400 Transactions Over Intranets and the Public
Internet |
| 450. |
Secure
Communication over the Internet |
| 451. |
Secure
Communications over Insecure Networks |
| 452. |
Secure
Deletion of Data from Magnetic and Solid-State
Memory |
| 453. |
Secure
Names for Bit-Strings |
| 454. |
SecureDoc™
Encryption Security Products |
| 455. |
Securing
Communications on an Intranet |
| 456. |
Securing
the Internet |
| 457. |
Securing
Web Communications with SSL and Smart
Cards |
| 458. |
Securing
Your Web Site for Business (VeriSign) |
| 459. |
Security
Architecture |
| 460. |
Security
Basics: All about Encryption... in
English! |
| 461. |
Security
Pitfalls in Cryptography |
| 462. |
Security
Problems in the TCP/IP Protocol Suite |
| 463. |
Session
Key Distribution Using Smart Cards |
| 464. |
SET
Comparative Performance Analysis |
| 465. |
Single
Sign-On Deployment Guide |
| 466. |
SKP-100
Specification - Gigabit Network Security
Processor |
| 467. |
Smart
Card Logon |
| 468. |
Smart
Cards |
| 469. |
Smart
Cards: Enabling Smart Commerce in the Digital
Age |
| 470. |
Smart-Card
Devices and Applications |
| 471. |
Smartphone
R380 with Secure Computing SafeWord |
| 472. |
Software
Generation of Practically Strong Random
Numbers |
| 473. |
Some
Encryption Issues |
| 474. |
SSH
IPSEC Express HW Acceleration |
| 475. |
SSH
Secure Shell |
| 476. |
SSL
Basics for Internet Users |
| 477. |
StealthKey:
Making Today’s Encryption More Secure and Easier
to Use |
| 478. |
Strong
Encryption Guide |
| 479. |
Sun
Crypto Accelerator I Board: Hardware and Software
Components and Requirements |
| 480. |
Sun
Tzu - What Price Infowar on the Net? |
| 481. |
Tamper
Resistance - a Cautionary Note |
| 482. |
Technical
Discussion on Data Encryption Methods |
| 483. |
Technical
Discussion on Voice Encryption Methods |
| 484. |
Technical
Introduction to CIP 3.0 |
| 485. |
Technology
Report: Application Verification System |
| 486. |
The
Alcatel Secure VPN Solution Basic
Cryptography |
| 487. |
The
Cocaine Auction Protocol: On the Power of
Anonymous Broadcast |
| 488. |
The
Elliptic Curve Cryptosystem for Smart
Cards |
| 489. |
The
End of the RSA Patent: Less Barriers Than Ever to
the Use of Public Key Cryptography |
| 490. |
The
Export of Certain Networking Encryption Products
Under ELAs as an Alternative to "Key
Escrow/Recovery Products" Under KMI |
| 491. |
The
Health Insurance Portability & Accountability
Act, the Gramm-Leach-Bliley Act, &
CKM® |
| 492. |
The
Intelligent Telephone Today and Tomorrow:
Innovative Smart Card Applications in
GSM |
| 493. |
The
Mega-Proxy Problem for e-Commerce Providers:
Persistence During Secure Sessions |
| 494. |
The
Need for Cryptographic Accelerators in Electronic
Commerce |
| 495. |
The
Opportunity and Requirements for Managed Internet
Security Services |
| 496. |
The
Risks of Key Recovery, Key Escrow, and Trusted
Third-Party Encryption |
| 497. |
The
SafeNet Security System Version 3
Overview |
| 498. |
The
Security Risks of Using Passwords |
| 499. |
The
Who Is It? Biometric Security System |
| 500. |
Time
for Data Compression |
| 501. |
Timing
Attacks on Implementations of Diffie-Hellman, RSA,
DSS, and Other Systems |
| 502. |
Trapping
and Tracking Hackers: Collective Security for
Survival in the Internet Age |
| 503. |
Understanding
Digital Certificates and Secure Sockets Layer
(SSL) |
| 504. |
Understanding
Digital Certificates and Wireless Transport Layer
Security |
| 505. |
Understanding
FIPS 140-1 |
| 506. |
Understanding
Microsoft Proxy Server 2.0 |
| 507. |
Understanding
Public Key Infrastructures |
| 508. |
Unlocking
Open Government - The 10 Downing St.
Experience |
| 509. |
Using
PKI for PC Security |
| 510. |
Using
the Citrix® SSL Relay Service™ |
| 511. |
VASCO
Digipass Family of Authentication
Devices |
| 512. |
VelociRaptor |
| 513. |
VeriSign
Authentication Services |
| 514. |
VeriSign
Gateway Service |
| 515. |
VeriSign®
Go Secure!SM for Identrus: Authentication Services
for Trusted B2B Transactions |
| 516. |
Virtual
Private Networks (VPN) |
| 517. |
Virtual
Smart Card Solution |
| 518. |
VPNs:
Using a WebRamp for Low Cost Remote
Access |
| 519. |
We
Need a Public Key Infrastructure |
| 520. |
Weak
Points of One Fast Cryptographic Checksum
Algorithm and its Improvement |
| 521. |
What
is Diffie-Hellman? |
| 522. |
What's
All of the Fuss About Triple-DES? How Strong is it
Anyway? |
| 523. |
Who
Goes There? Authentication in the On-Line
World |
| 524. |
Why
Cryptography is Harder Than It Looks |
| 525. |
Why
Encryption on the Internet Really Works |
| 526. |
Why
Kyberpass is a Security Leader |
| 527. |
Windows
2000 Security Technical Overview |
| 528. |
Windows
NT Server as a CIFS Client |
| 529. |
Your
Surest Path to AES |
| 530. |
ZixMail
and ZixMail.net Basic Encryption and Delivery
Process |
| 531. |
µ
PKI Technical Whitepaper
v1.1 |