Search


PDF Archive search engine
Last database update: 02 December at 14:45 - Around 76000 files indexed.


Show results per page

Results for «encrypt»:


Total: 200 results - 0.046 seconds

SSH Session Structure 100%

Symmetric Encryption Symmetrical encryption is a form of encryption where a key can be used to encrypt messages to the other party, and also to decrypt the messages received from the other participant.

https://www.pdf-archive.com/2018/02/05/ssh-session-structure/

05/02/2018 www.pdf-archive.com

Assignment4-CryptoFS-SP17 99%

This file system will encrypt on a per-file basis, in contrast to what is commonly known as full-disk encryption.

https://www.pdf-archive.com/2017/06/03/assignment4-cryptofs-sp17/

03/06/2017 www.pdf-archive.com

Forensic Recovery of Scrambled Telephones 98%

Dm-crypt relies on the devicemapper infrastructure and Crypto API and thus, it provides a flexible way to 4 encrypt block devices transparently.

https://www.pdf-archive.com/2013/06/15/forensic-recovery-of-scrambled-telephones/

15/06/2013 www.pdf-archive.com

ZOC SSH Features 95%

Encryption Over time, the SSH protocol has seen a plethora of methods to be used to encrypt the communication (using shared secret was negotiated during the KEX phase as a cryptograhpic key).

https://www.pdf-archive.com/2018/02/05/zoc-ssh-features/

05/02/2018 www.pdf-archive.com

Kryptovoip Encrypted Software 94%

And the reason lies in the fact that both speakers should be able to encrypt and code received and made phone calls.

https://www.pdf-archive.com/2016/06/18/kryptovoip-encrypted-software/

18/06/2016 www.pdf-archive.com

NSA-Black-Paper 93%

Encrypt Your Emails.....................................................................................................................11 Encrypted Email for OS X / Windows / Linux............................................................................11 Encrypted Email for Android.......................................................................................................11 Encrypted Email for iOS..............................................................................................................11 Secure Your Chat and Text Messages.....................................................................................................12 Encrypted Chat for OS X / Windows / Linux..................................................................................12 Cryptocat....................................................................................................................................12 Pidgin / Adium / Jitsi..................................................................................................................14 Encrypted Chat for Android.............................................................................................................14 Encrypted Chat for iOS...................................................................................................................14 Secure Your Voice Calls.........................................................................................................................15 Encrypted Voice Calls for OS X / Windows / Linux.........................................................................15 Jitsi + Ostel.co.............................................................................................................................15 Encrypted Voice Calls for Android...................................................................................................16 CSipSimple app + Ostel.co..........................................................................................................16 RedPhone....................................................................................................................................16 Encrypted Voice Calls for iOS..........................................................................................................16 Groundwire app + Ostel.co.........................................................................................................16 Platform Independent Voice Call Encryption...................................................................................16 Silent Phone................................................................................................................................16 Secure Your Stored Data........................................................................................................................17 ...on your harddrive..........................................................................................................................17 ...in the cloud...................................................................................................................................17 Secure Your Payments............................................................................................................................18 The Bottom Line &

https://www.pdf-archive.com/2013/06/24/nsa-black-paper/

24/06/2013 www.pdf-archive.com

SecureWinsock 92%

Sign with Server’s private key the hashed session key concatenated alongside a copy of the plaintext session key, then encrypt the signed hash with the Client’s public key and send to Client Client:

https://www.pdf-archive.com/2016/01/02/securewinsock/

02/01/2016 www.pdf-archive.com

npatel 91%

https://www.pdf-archive.com/2017/08/15/npatel/

15/08/2017 www.pdf-archive.com

assignment1 90%

In the second part, you will encrypt your solution using gpg before submitting it.

https://www.pdf-archive.com/2016/11/21/assignment1/

21/11/2016 www.pdf-archive.com

Make a backup using iCloud and iTunes 87%

If you want to save Health and Activity data from your iOS device or Apple Watch, you’ll need to encrypt your backup:

https://www.pdf-archive.com/2016/04/11/make-a-backup-using-icloud-and-itunes/

11/04/2016 www.pdf-archive.com

Should we win the fight 87%

The sender would take my public key and use it to encrypt a message.

https://www.pdf-archive.com/2014/08/29/should-we-win-the-fight/

28/08/2014 www.pdf-archive.com

Flat Earth - Satellite Internet - What Is Going On? 86%

Whether you request a simple Google page of results or are streaming Netflix in HD, it’s up to this High-Speed Uplink center to receive all that data, encrypt it, and then shoot it back up to ViaSat-1.

https://www.pdf-archive.com/2017/05/21/flat-earth-satellite-internet-what-is-going-on/

21/05/2017 www.pdf-archive.com

Zeus-Crimeware-Toolkit 86%

Encryption key to encrypt config file url_loader :

https://www.pdf-archive.com/2011/03/26/zeus-crimeware-toolkit/

26/03/2011 www.pdf-archive.com

Renegotiating TLS 84%

Renegotiating TLS Marsh Ray Steve Dispensa PhoneFactor, Inc.

https://www.pdf-archive.com/2013/09/29/renegotiating-tls/

29/09/2013 www.pdf-archive.com

guide-en 79%

good circumvention tools encrypt traffic between a user and the circumvention provider, but they cannot encrypt the traffic between the circumvention provider and the site being visited.

https://www.pdf-archive.com/2012/10/19/guide-en-pdf/

19/10/2012 www.pdf-archive.com