Encryption White
Papers (531 papers) |
|
|
|
Featured White Papers |
1. |
The
Secure Sockets Layer Protocol – Enabling Secure
Web Transactions |
2. |
Privacy
and Security in Business Use of the
Internet |
|
|
|
White Paper Titles |
3. |
A
Practical Guide to the Right VPN
Solution |
4. |
Statistical
Identification of Encrypted Web Browsing
Traffic |
5. |
VeriSign
Digital Trust Services: Enabling Trusted Web
Services |
6. |
A
Lower Bound for Multicast Key
Distribution |
7. |
A
Technical Introduction to Digital
Signatures |
8. |
Access
Control Programmer's Guide |
9. |
Access
Management and Dynamic Relationships Between Users
and Information |
10. |
AES
Key Agility Issues in High-Speed IPsec
Implementations |
11. |
Ampliflied
Boomerang Attacks Against Reduced-Round MARS and
Serpent |
12. |
An
Introduction to Cryptography and Digital
Signatures |
13. |
API
Level Attacks on Embedded Systems |
14. |
API-Level
Attacks on Embedded Systems |
15. |
AppGate
Client & Server Version 4.0 Technical White
Paper |
16. |
Are
We Eliminating Complexity or Transliterating
It? |
17. |
Authorization:
Unified Privilege Management Solutions for Secure
e-Business |
18. |
Beyond
Encryption: Rule #1: Don't put Your Head in a
Noose |
19. |
Biometrics
and Cryptography: Match On Card Paves the Way to
Convenient Security |
20. |
CKM
® Technology Overview |
21. |
Comparing
Cylink Products and Security Add-Ons to Network
Products |
22. |
Conditional
and User Specific Access to Services and Resources
Using Annotation Watermarks |
23. |
CrypKey
Licensing |
24. |
Cryptographic
Modes of Operation for the Internet |
25. |
CryptoWorks
Fine Grain Conditional Access: Protection of
Broadcast Content in IP Multicasting
Networks |
26. |
Datacard
MAP Architecture |
27. |
Datacard®
Smart Card Personalization Manager |
28. |
Digital
Signature Requirements and DB Sign Data Security
Suite |
29. |
Efficient
Algorithms for Computing Differential Properties
of Addition |
30. |
Electronic
Signatures vs. Digital Signatures |
31. |
EMERALD's
Component-Based Approach to Network
Security |
32. |
Encrypted
E-mail: Close One Door, Open Another |
33. |
Encrypted
Tunnels using SSH and MindTerm |
34. |
Encrypting
Virtual Memory |
35. |
Encryption
Fundamentals |
36. |
Encryptonite
System White Paper |
37. |
Enforcing
Formal Security Properties |
38. |
Financial
Cryptography 2001 E-Voting Panel: The Business of
Electronic Voting |
39. |
Freedom
2.1 Security Issues and Analysis |
40. |
Getting
a Grip on Access Control Terms |
41. |
Getting
Commerce-Ready with NuSphere and PHP |
42. |
High-Speed
Rijndael Encryption/Decryption
Processors |
43. |
How
to Steal Streaming Media |
44. |
Identity
Based Encryption from the Weil Pairing |
45. |
Improved
Cryptanalysis of Rijndael |
46. |
Initial
Cryptanalysis of the RSA SecurID
Algorithm |
47. |
Introduction
to Encryption and Digital Signatures |
48. |
Introduction
to Public-Key Cryptography |
49. |
Key
Operations as a Network Service |
50. |
Linux
2.4: Next Generation Kernel Security |
51. |
Low-Speed
Rijndael Encryption/Decryption
Processors |
52. |
Managed
Security Monitoring: Network Security for the 21st
Century |
53. |
Multi-Grade
Cryptography |
54. |
NDMP
Support in NetWorker 6 |
55. |
Network
Attack and Defense |
56. |
Not
So Secret Passwords |
57. |
Planning
and Installing a Windows 2000 Remote Access VPN
Server |
58. |
Privacy:
Our Two Cents |
59. |
Random
Number Generation |
60. |
Saecos
Security Best Practices: Authentication and
Authorization |
61. |
SC-CFS:
Smartcard Secured Cryptographic File
System |
62. |
Secure
and Invisible Data Hiding in 2-Color
Images |
63. |
Secure
Backup and Application Access for ASPs |
64. |
Secure
Data Center Access: Authentication and
Encryption |
65. |
Security
Services Markup Language |
66. |
SEG-
A Provably Secure Variant of El-Gamal |
67. |
Seven
Steps to Digital Signature
Implementation |
68. |
Sigaba
Technology Technical White Paper |
69. |
SSL
Is Not a Magic Bullet |
70. |
StealthKey™
Management and the SKP-100 Security
Processor |
71. |
Strengthening
Netegrity SiteMinder Authentication |
72. |
Tamper
Resistance - a Second Opinion |
73. |
The
Complexities of Viral VB Scripts |
74. |
The
Differences Between ANSI X9.31 and RSA
PKCS#1 |
75. |
The
New hp Benchmark for Measuring Encrypted
Transactions |
76. |
The
Widevine Cypher™ Cryptosystem |
77. |
Time
Synchronization and Windows 2000 Active
Directory |
78. |
Timed-Release
Cryptography |
79. |
Tivoli
Storage Manager—Adaptive Sub-file Differencing and
Encryption for Mobile and Remote Clients |
80. |
Understanding
the Raw Materials of the Internet |
81. |
Using
SSH Tunneling |
82. |
Verifiable,
Secret Shuffles of ElGamal Encrypted Data for
Secure Multi-Authority Elections |
83. |
Windows
2000 Server and Key Management Server
Interoperability |
84. |
Windows
PGP (Pretty Good Privacy) ASCII Armor Parser
Vulnerability |
85. |
XML
Encryption Requirements |
86. |
µ
ASN.1 Whitepaper |
87. |
A
Backgrounder to Securing Your Internet
Connection |
88. |
A
Chosen Ciphertext Attack against Several E-Mail
Encryption Protocols |
89. |
A
Cryptographic Evaluation of IPsec |
90. |
A
Networking Industry White Paper on Encryption
Export Controls |
91. |
A
Pocketful of Keys |
92. |
A
Technical Introduction to Private
Credentials |
93. |
Advanced
Encryption Standard (AES) Perspective and
Strategies |
94. |
Amplified
Boomerang Attacks Against Reduced-Round MARS and
Serpent |
95. |
An
Introduction to BEA WebLogic® Server
Security |
96. |
An
Open-source Cryptographic Coprocessor |
97. |
Atlas
Encryption |
98. |
Basic
Elements of a PKI |
99. |
Best
Practices: The Key to Ultimate Trust! |
100. |
Bypassing
Secure Web Transactions via DNS
Corruption |
101. |
Can
Cryptography Prevent Computer Viruses? |
102. |
Can
Pseudonymity Really Guarantee Privacy? |
103. |
Certificate
Revocation: When Not to Trust |
104. |
Communications
Security in an All-IP World |
105. |
Competitive
Performance Testing of IPSec Encryption (3DES)
Capable Ethernet Adapters |
106. |
Conducting
a Universally Verifiable Electronic Election Using
Homomorphic Encryption |
107. |
Crypto
101 |
108. |
Cryptographic
Acceleration Secures eCommerce, Enhances Server
Performance |
109. |
Cryptography
and Security |
110. |
Data
Encryption Standard (DES) Implementation on the
TMS320C6000 |
111. |
Data
Encryption using DES/Triple-DES Functionality in
Spartan-II FPGAs |
112. |
Digital
Signature Standard (DSS) |
113. |
Digital
Transmission Content Protection |
114. |
DSA
and RSA Key and Signature Encoding for the KeyNote
Trust Management System |
115. |
DSL
Security |
116. |
E-Signatures:
Progress with Weak Security? |
117. |
Elliptic
Curve Cryptography Support in Entrust |
118. |
Encrypting
File System for Windows 2000 |
119. |
Execution
Control Lists: an Approach to Defending Against
New and Unknown Malicious Software |
120. |
Expressive
or Functional? Encryption Algorithms as Protected
First Amendment Speech |
121. |
Fast...And
Secure |
122. |
Freedom
2.0 Mail System |
123. |
Frequently
Asked Questions About Today's
Cryptography |
124. |
HTTP
Over TLS |
125. |
Improving
Smartcard Security Using Self-Timed Circuit
Technology |
126. |
Integrity
of Inter-Enterprise Information Exchange –
Viquity’s Unique Security Infrastructure |
127. |
Internet
Voting Security |
128. |
Introduction
to PKI |
129. |
Is
Your Wide Area Network Really Secure? |
130. |
Issuing
and Validating Certificates to Reduce Web
Transaction Risk |
131. |
Key
Agility in MARS |
132. |
KeyGrab
T00 - the Search for Keys Continues.. |
133. |
Make
Your Software Behave: Cryptography
Essentials |
134. |
Make
Your Software Behave: Everything to Hide |
135. |
Make
Your Software Behave: Tried and True
Encryption |
136. |
MARS
and the AES Selection Criteria |
137. |
MindTerm
Documentation |
138. |
Networks
+ Cryptography = Electronic Commerce. What's
Missing? |
139. |
Novell's
Weak Remote Access Password Encryption
Algorithm |
140. |
Overview
of Certification Systems: X.509, PKIX, CA, PGP
& SKIP |
141. |
Password
Management Best Practices |
142. |
Persistence
Mechanisms: Enabling Today’s Dynamic e-Business
Transactions |
143. |
Planning
for FIPS 140-2 -- an Evolution of Security
Requirements |
144. |
Preliminary
Cryptanalysis of Reduced-Round |
145. |
Reasoning
about Accountabilities in Cryptographic Protocols
for E-Commerce Using a Generic Belief
Logic |
146. |
Remarks
on the Security of the Elliptic Curve
Cryptosystem |
147. |
S2ML
(Security Services Markup Language) |
148. |
Secure
Coprocessor Integration with Kerberos V5 |
149. |
Secure
Internet Smartcards |
150. |
Securing
Multiple Web Servers |
151. |
Security
and Productivity Improvements – Sufficient for the
Success of Secure Electronic
Transaction? |
152. |
Security
Versus Compatibility in Online Elections |
153. |
Self-Study
Course in Block Cipher Cryptanalysis |
154. |
Shibboleth:
Private Mailing List Manager |
155. |
Side
Channel Cryptanalysis of Product Ciphers |
156. |
Software
Security for Developers: One-time Pads |
157. |
Solsoft
NP: Putting Security Policies into
Practice |
158. |
SSH
IPSEC Express Toolkit: Integration with Customer
Applications |
159. |
SSL
Primer |
160. |
SSL
Theory and Practice |
161. |
Step-by-Step
Guide to Encrypting File System (EFS) |
162. |
Ten
Risks of PKI: What You're Not Being Told about
Public Key Infrastructure |
163. |
The
Added Value of EMBASSY in the Digital
World |
164. |
The
Concept of Trust in Network Security |
165. |
The
Correctness of Crypto Transaction Sets |
166. |
The
Design and Verification of a Cryptographic
Security Architecture |
167. |
The
End of SSL and SSH? |
168. |
The
Enduring Value of Symmetric Encryption |
169. |
The
MAOS Trap |
170. |
The
Pre-Encryption Fallacy |
171. |
The
XML Security Suite: Increasing the Security of
e-Business |
172. |
Tracking
Digital Signatures |
173. |
Transitive
Signature Schemes |
174. |
Two
Remarks on Public Key Cryptology |
175. |
Upgrading
to TLS Within HTTP/1.1 |
176. |
Using
nCipher Hardware to Secure Your Identrus
Infrastructure |
177. |
Using
SSL as an Encryption Tool |
178. |
Using
Win2000's Foolproof Encryption |
179. |
Virtual
Private Networks |
180. |
VPNs:
Performance, Security and Management for
All |
181. |
What's
'E' About Signatures? |
182. |
When
an E-Signature is Not a Signature |
183. |
Your
Surest Path to AES |
184. |
1999
Crypto Year-in-Review |
185. |
A
Calculus for Cryptographic Protocols |
186. |
A
Current Perspective on Encryption
Algorithms |
187. |
Addition
of Kerberos Cipher Suites to Transport Layer
Security (TLS) |
188. |
Adopting
Single Sign-On for NDS |
189. |
An
Introduction to WebLogic Server: Security Features
and Benefits of the WebLogic Server |
190. |
An
Overview of Cryptography |
191. |
Analysis
of the Internet Key Exchange Protocol Using the
NRL Protocol Analyzer |
192. |
ANS
White Paper: Implementation of Encryption Export
Policy ‘99 |
193. |
Applying
Communicator's Security Features |
194. |
Are
Strong Primes Needed for RSA? |
195. |
Biometric
Decision Landscapes |
196. |
Bluetooth
Security Architecture Version 1.0 |
197. |
Brute
Force Attack on UNIX Passwords with SIMD
Computer |
198. |
Building
Intrusion Tolerant Applications |
199. |
Certificate
Authority Root Key Protection: Recommended
Practices |
200. |
Copy
Protection for DVD Video |
201. |
Cost
Profile of a Highly Assured, Secure Operating
System |
202. |
Cryptanalysis
of Contents Scrambling System |
203. |
Cryptanalysis
of Magenta |
204. |
Cryptanalysis
of Microsoft's PPTP Authentication Extensions
(MS-CHAPv2) |
205. |
Cryptanalysis
of Microsoft's PPTP Authentication Extensions
(MS-CHAPv2) |
206. |
Crypto
Across the Enterprise |
207. |
Cryptographic
Verification of Test Coverage Claims |
208. |
Cryptography
is Not the Ultimate Solution |
209. |
Data
Encryption Standard (DES) |
210. |
Data
Encryption Techniques |
211. |
Discrete
Logarithms: the Past and the Future |
212. |
DVD
Encryption Hacked |
213. |
Encryption
- Getting started: Algorithms and Keys |
214. |
Encryption
and Law Enforcement |
215. |
Encryption
of Long Blocks Using a Short-Block Encryption
Procedure |
216. |
Encryption
White Paper |
217. |
Export
Controls on “Recoverable” Products under the
Export Administration Regulations |
218. |
How
SSL Works |
219. |
Improved
Analysis of Some Simplified Variants of
RC6 |
220. |
International
Cryptography |
221. |
Managing
Network Security; The Limits of
Cryptography |
222. |
MARS
- a Candidate Cipher for AES |
223. |
Minimizing
Bandwidth for Remote Access to Cryptographically
Protected Audit Logs |
224. |
On
the Construction of Variable-Input-Length
Ciphers |
225. |
Overview
of Current Developments in International
Cryptography Regulation |
226. |
Partnerships
Accelerate Service Deployment In
Telecoms |
227. |
Platforms
& Infrastructure: Protect Guards Laptop and
Desktop Data |
228. |
Privacy
in the Digital Age: Encryption Policy - A Call for
Congressional Action |
229. |
Protecting
Secret Keys with Personal Entropy |
230. |
Reaction
Attacks Against Several Public-Key
Cryptosystems |
231. |
Recent
Results on Signature Forgery |
232. |
Risks
of Relying on Cryptography |
233. |
Round
Three: Encryption Software & Export
Controls |
234. |
Secure
Key Recovery |
235. |
Secure
Virtual Private Networks for Enterprise |
236. |
Security
in the Real World: How to Evaluate
Security |
237. |
Smart
Cards and Network Security |
238. |
Smart
Cards in Your Security Future |
239. |
Smart
Cards White Paper |
240. |
Software
Smart Cards via Cryptographic Camouflage |
241. |
Some
Non-Random DES Characteristics and an
Identification Attack on DES |
242. |
SSH
X.509 Certificate Tools |
243. |
The
Beer Bottle Cipher |
244. |
The
Design of a Cryptographic Security
Architecture |
245. |
The
INTEL® Random Number Generator |
246. |
The
TLS Protocol |
247. |
Twenty
Years of Attacks on the RSA Cryptosystem |
248. |
Unicity,
DES Unicity, Open-Keys, Unknown-Keys |
249. |
Using
Public Key Digital Signatures in Paperless
Information Systems |
250. |
Why
Crypto-Control Will Fail |
251. |
Why
Cryptosystems Fail |
252. |
Why
Johnny Can't Encrypt: A Usability Evaluation of
PGP 5.0 |
253. |
Are
'Strong' Primes Needed for RSA? |
254. |
Big
Brother in the Wires: Wiretapping in the Digital
Age |
255. |
Cryptanalytic
Attacks on Pseudorandom Number
Generators |
256. |
Evaluating
the Cost of Ownership for Digital Certificate
Projects |
257. |
Implementation
of a Provably Secure, Smartcard-based Key
Distribution Protocol |
258. |
Key
Update and the Complete Story on the Need for Two
Key Pairs |
259. |
LOUIS
Cryptography Support |
260. |
Network
Management on the Web (NeMoW) with
Tonics |
261. |
Novell
Certificate Extension Attributes: Novell Security
Attributes |
262. |
Reduced
Ideals in Function Fields |
263. |
SKIPJACK
and KEA Algorithm Specifications |
264. |
Smartcard
Integration with Kerberos V5 |
265. |
A
Cryptographic Checksum for Integrity
Protection |
266. |
A
Method for Protecting Copyright on
Networks |
267. |
A
New Family of Authentication Protocols |
268. |
A
PKI Primer - Public Key Cryptography: Public and
Private Keys and Digital Signatures |
269. |
A
Practical Introduction to the Dallas Semiconductor
iButton |
270. |
A
Short History of Cryptography |
271. |
Access
Management and PKI: Two Worlds Becoming
One |
272. |
ActivCard
Synchronous Authentication |
273. |
Advances
in Cryptography - ECC, Future Resiliency, and High
Security Systems |
274. |
Alternate
Representations of the Public Key Cryptography
Standards (PKCS) Using S-Expressions |
275. |
An
Introduction to IP Security (IPSec)
Encryption |
276. |
An
Introduction to PKI |
277. |
An
Introduction to Steganography |
278. |
Analog
Devices' Mixed-Signal Processors Enable a Novel
Solution for Secure Communications |
279. |
Another
Modification of a Fast Cryptographic
Checksum |
280. |
Authentication |
281. |
Authentication
Metric Analysis and Design |
282. |
BabylonMETA:
Introducing a Revolutionary Encryption
Device |
283. |
Basic
Elements of Quantum Information
Technology |
284. |
Benefits
of Using VPN Technology |
285. |
Biometric
Encryption™ |
286. |
Building
an E-Commerce Trust Infrastructure |
287. |
Building
the InfraStructure for Secure Electronic
Commerce |
288. |
Card
Security and Cryptography |
289. |
CAs:
the Business Opportunity |
290. |
Cellular
Automata Transform (CAT) - Data Compression and
Encryption Using Cellular Automata
Transforms |
291. |
Central
Policy Mediation for Information Sharing |
292. |
Certificate
Management Standards |
293. |
Check
Point VPN-1 Accelerator Card |
294. |
CIFS
Authentication and Security |
295. |
Cisco
IOS Software Feature: Network-Layer
Encryption |
296. |
Client
Puzzle Protocol: Cryptographic Defense against
Connection Depletion |
297. |
Columbitech
Wireless Platform Security |
298. |
Comments
on the ir-File Electronic Tax Filing
System |
299. |
Comparison
of Windows 2000 & WinVista S to Infinity: Data
Protection & Encryption
Functionality |
300. |
Computers:
the British Answer to the German Enigma
Machines |
301. |
CONNECT:
Enterprise and Secure FTP - the Revolution is
ON |
302. |
Copy
Protection Framework for DVD Audio |
303. |
Cross-certification
and PKI Policy Networking |
304. |
Cryonics,
Cryptography, and Maximum Likelihood
Estimation |
305. |
Cryptanalysis
of Microsoft's Point-to-Point Tunneling Protocol
(PPTP) |
306. |
Crypto
in Europe - Markets, Law and Policy |
307. |
Crypto
Tutorial |
308. |
Cryptographic
Acceleration with Radware’s CertainT Series 100 -
SSL Accelerator |
309. |
Cryptographic
File System for Unix |
310. |
Cryptographic
Security and Key Management Systems - the nFast/KM
Solution |
311. |
Cryptography
and PKI Basics |
312. |
Cryptography
and the Internet |
313. |
Cryptography
in a Hole - Cryptographic Service
Providers |
314. |
Cryptography
in WAP |
315. |
Cryptography
Policy and the Information Economy |
316. |
Cryptography
Standards and Infrastructure for the Twenty-First
Century |
317. |
Cryptomathic's
Java Cryptographic Service Provider |
318. |
CyberSafe
Public Key Solution: TrustBroker Virtual Smart
Card Option v1.0 |
319. |
Data
and Computer Security |
320. |
Datacryptor
2000 Key Management: Secure and Automated
Encryption for Wide Area Networks (WANS) |
321. |
Demystifying
VPN |
322. |
Deploying
a Public Key Infrastructure for Microsoft Exchange
5.5 |
323. |
DES
Encryption, CryptoCom V.34 |
324. |
DES
Key Search Project |
325. |
Designing
a Secured Website: What You Need to Know about SSL
Benchmarking |
326. |
Detecting
Stepping Stones |
327. |
DICA
Network Security Product Line Encryption |
328. |
Differential
Power Analysis |
329. |
Digipass
Controller |
330. |
Digipass
Deployment Procedures |
331. |
Digital
Certificates & Encryption |
332. |
Digital
Images Multiresolution Encryption |
333. |
Digital
Signatures and Certificates |
334. |
Digital
Signatures: The Key to Information Technology
Security |
335. |
Discrete
Logarithm Problem on Elliptic Curves of Trace
One |
336. |
Discrete
Logarithm Problem on Elliptic Curves of Trace
One |
337. |
Distribution
of the Prime Factors of p+d |
338. |
DIVA
Computer Evidence: Digital Image Verification and
Authentication |
339. |
E-mail
Encryption: What It is and Why You Need It
(FirstVPN) |
340. |
Electronic
Signatures - Signing up to the Digital
Economy |
341. |
Elliptic
Curve Cryptography |
342. |
Elliptic
Curve DSA (ECDSA): An Enhanced DSA |
343. |
Elliptic
Curves - a New Generation of Public Key
Techniques |
344. |
Email
and the Internet |
345. |
Email
Encryption: What It Is and Why You Need
It |
346. |
Embedded
Intel Architecture in Virtual Private Network
Design |
347. |
Embedded
Router Encryption |
348. |
Enabling
Trust in SSL Transactions |
349. |
Encoding
Hypermedia Applications with HyTime: The MIPS
Approach |
350. |
Encrypting
ATM Firewall |
351. |
Encryption
and Digital Certificates |
352. |
Encryption
of Information - Internet Data Transmission
Security |
353. |
Encryption:
Answering the Market Need |
354. |
End-to-end
Protection of Data |
355. |
Ensuring
Secure Data Transfer with Encryption |
356. |
Enterprise
Encryption and Access Control for Laptops and
Workstations |
357. |
Entry-Level
Communications Appliance for Security: Effect of
Network Configuration on Performance |
358. |
Establishing
a Security Process that Works |
359. |
Evaluation
Protocol: PC Based Encryption Solutions |
360. |
Explaining
Encryption |
361. |
Exploring
DB2 Data Access via Web and Internet |
362. |
Export
of Cryptography |
363. |
Extended
Security Interface and Kerberos in PATROL
V3.3 |
364. |
F-Secure
Integration for Unicenter TNG |
365. |
File
Gateway Product Overview |
366. |
Finding
Your Way Through the VPN Maze |
367. |
Firewall
OEM Uses of CyberSoft Technology |
368. |
Firewalls
and Virtual Private Networks |
369. |
Foundations
of Enterprise Network Security |
370. |
Frame
Relay Key Management |
371. |
Free
Space Optical Transmission Security |
372. |
Gemini
Trusted VPN & Trusted VPDN |
373. |
General
Cryptographic Knowledge |
374. |
Gigabit
SSL and Beyond |
375. |
Government:
Extranet VPN for Cheque Distribution to Regional
Data Centres |
376. |
Grictraveler
3.0 Roaming Applications |
377. |
Growing
Development of Foreign Encryption Products in the
Face of U.S. Export Regulations |
378. |
Hardware
Encryption Modules |
379. |
High
Performance Network Security Methods: Comparisons
and Case Studies |
380. |
How
Do Digital Time-Stamps Support Digital
Signatures? |
381. |
How
Electronic Encryption Works and How it Will Change
Your Business |
382. |
How
to Break Netscape's Server Key
Encryption |
383. |
How
to Develop a Network Security Policy: An Overview
of Internetworking Site Security |
384. |
How
to Recover Private Keys for Microsoft Internet
Explorer, Internet Information Server, Outlook
Express, and many Others |
385. |
Human
Memory and the Graphical Password |
386. |
IBM
Mobile Connect and Security |
387. |
Identity
Confirmed |
388. |
Improving
the Efficiency and Reliability of Digital
Time-Stamping |
389. |
Innovation.
E-Business. Decision Data. |
390. |
Institutional
Directory Deployment Proposal |
391. |
Intel
Internet Exchange Architecture |
392. |
Intellectual
Preservation and Electronic Intellectual
Property |
393. |
InterLynx/S:
A Great Solution for American Produce |
394. |
Internet
Commerce |
395. |
Internet
Security |
396. |
Introducing
the KeyGen ASK |
397. |
Introduction
to Encryption |
398. |
Introduction
to Public Key Cryptography |
399. |
Key
Escrow vs Key Recovery |
400. |
Key
Fragmentation for High Level Digital Signature
Security |
401. |
Key
Management in an Encrypting File System |
402. |
L2TP/IPSEC
with Windows 2000 Client and Server |
403. |
LASAT
SafePipe™ VPN |
404. |
Latest
Generation Technology for Immobilizer
Systems |
405. |
Liability
and Computer Security: Nine Principles |
406. |
MailGuardian
Delivers Transparent Security to Users |
407. |
MailRecall:
Control and Protect E-mail Messages |
408. |
Making
an Empty Promise with a Quantum Computer |
409. |
Memory
Protection for Networked Embedded
Systems |
410. |
Microsoft
Windows 2000 Public Key Infrastructure |
411. |
MiniPASS:
Authentication and Digital Signatures in a
Constrained Environment |
412. |
Murphy's
Law and Computer Security |
413. |
Netscape
Exportable 128-bit SSL Software |
414. |
Novell
Modular Authentication Services |
415. |
Novell:
BorderManager Authentication Service |
416. |
NSS:
The NTRU Signature Scheme |
417. |
NTRU:
A Ring Based Public Key Cryptosystem |
418. |
Online
Resources Information Security |
419. |
Packetized
SSL - Web Content Delivery Moves Toward Andes
Networks’ Packetized SSL |
420. |
Packetized
SSL — Understanding the Advantage |
421. |
Panda
Security for Windows 95/98 Technical
Supplement |
422. |
Password
Security Guidelines |
423. |
Passwords:
Security Weaknesses & User
Limitations |
424. |
PATROL®
7 Security Implementation: Securing the Data in
Your PATROL - Managed Environment |
425. |
Payment
Protocols: Cache on Demand |
426. |
Permission
Headers and Contract Law |
427. |
PKA
- Private Key Access |
428. |
PKI
- A Technology or a Hype Too Far? |
429. |
Playing
Hide and Seek with Stored Keys |
430. |
Polynomial
Rings and Efficient Public Key
Authentication |
431. |
Polynomial
Rings and Efficient Public Key Authentication
II |
432. |
PPTP
Security Issues - In Defense of PPTP |
433. |
Privacy
Concerns Increase |
434. |
Protecting
Stored Data with F-Secure FileCrypto |
435. |
Protecting
Your Private Key |
436. |
Public
Key Cryptography |
437. |
Public
Key Cryptography in Vordel Products |
438. |
Public
Key Distribution using Directory
Services |
439. |
Public
Key Encryption Systems - A Primer |
440. |
Public
Key-Based User Authentication |
441. |
Quantum
Cryptography - the Unbreakable Code |
442. |
Quantum
Cryptology |
443. |
Radicchio
Guidelines for Secure m-Business |
444. |
Risk
Management Using Threshold RSA
Cryptosystems |
445. |
Risks
of Key Recovery, Key Escrow, and Trusted
Third-Party Encryption |
446. |
Robustness
Principles for Public Key Protocols |
447. |
SafeWord
and Web Plug-Ins Support |
448. |
Scale
to Unlimited Users with the SafeWord Domain
Feature |
449. |
Secure
AS/400 Transactions Over Intranets and the Public
Internet |
450. |
Secure
Communication over the Internet |
451. |
Secure
Communications over Insecure Networks |
452. |
Secure
Deletion of Data from Magnetic and Solid-State
Memory |
453. |
Secure
Names for Bit-Strings |
454. |
SecureDoc™
Encryption Security Products |
455. |
Securing
Communications on an Intranet |
456. |
Securing
the Internet |
457. |
Securing
Web Communications with SSL and Smart
Cards |
458. |
Securing
Your Web Site for Business (VeriSign) |
459. |
Security
Architecture |
460. |
Security
Basics: All about Encryption... in
English! |
461. |
Security
Pitfalls in Cryptography |
462. |
Security
Problems in the TCP/IP Protocol Suite |
463. |
Session
Key Distribution Using Smart Cards |
464. |
SET
Comparative Performance Analysis |
465. |
Single
Sign-On Deployment Guide |
466. |
SKP-100
Specification - Gigabit Network Security
Processor |
467. |
Smart
Card Logon |
468. |
Smart
Cards |
469. |
Smart
Cards: Enabling Smart Commerce in the Digital
Age |
470. |
Smart-Card
Devices and Applications |
471. |
Smartphone
R380 with Secure Computing SafeWord |
472. |
Software
Generation of Practically Strong Random
Numbers |
473. |
Some
Encryption Issues |
474. |
SSH
IPSEC Express HW Acceleration |
475. |
SSH
Secure Shell |
476. |
SSL
Basics for Internet Users |
477. |
StealthKey:
Making Today’s Encryption More Secure and Easier
to Use |
478. |
Strong
Encryption Guide |
479. |
Sun
Crypto Accelerator I Board: Hardware and Software
Components and Requirements |
480. |
Sun
Tzu - What Price Infowar on the Net? |
481. |
Tamper
Resistance - a Cautionary Note |
482. |
Technical
Discussion on Data Encryption Methods |
483. |
Technical
Discussion on Voice Encryption Methods |
484. |
Technical
Introduction to CIP 3.0 |
485. |
Technology
Report: Application Verification System |
486. |
The
Alcatel Secure VPN Solution Basic
Cryptography |
487. |
The
Cocaine Auction Protocol: On the Power of
Anonymous Broadcast |
488. |
The
Elliptic Curve Cryptosystem for Smart
Cards |
489. |
The
End of the RSA Patent: Less Barriers Than Ever to
the Use of Public Key Cryptography |
490. |
The
Export of Certain Networking Encryption Products
Under ELAs as an Alternative to "Key
Escrow/Recovery Products" Under KMI |
491. |
The
Health Insurance Portability & Accountability
Act, the Gramm-Leach-Bliley Act, &
CKM® |
492. |
The
Intelligent Telephone Today and Tomorrow:
Innovative Smart Card Applications in
GSM |
493. |
The
Mega-Proxy Problem for e-Commerce Providers:
Persistence During Secure Sessions |
494. |
The
Need for Cryptographic Accelerators in Electronic
Commerce |
495. |
The
Opportunity and Requirements for Managed Internet
Security Services |
496. |
The
Risks of Key Recovery, Key Escrow, and Trusted
Third-Party Encryption |
497. |
The
SafeNet Security System Version 3
Overview |
498. |
The
Security Risks of Using Passwords |
499. |
The
Who Is It? Biometric Security System |
500. |
Time
for Data Compression |
501. |
Timing
Attacks on Implementations of Diffie-Hellman, RSA,
DSS, and Other Systems |
502. |
Trapping
and Tracking Hackers: Collective Security for
Survival in the Internet Age |
503. |
Understanding
Digital Certificates and Secure Sockets Layer
(SSL) |
504. |
Understanding
Digital Certificates and Wireless Transport Layer
Security |
505. |
Understanding
FIPS 140-1 |
506. |
Understanding
Microsoft Proxy Server 2.0 |
507. |
Understanding
Public Key Infrastructures |
508. |
Unlocking
Open Government - The 10 Downing St.
Experience |
509. |
Using
PKI for PC Security |
510. |
Using
the Citrix® SSL Relay Service™ |
511. |
VASCO
Digipass Family of Authentication
Devices |
512. |
VelociRaptor |
513. |
VeriSign
Authentication Services |
514. |
VeriSign
Gateway Service |
515. |
VeriSign®
Go Secure!SM for Identrus: Authentication Services
for Trusted B2B Transactions |
516. |
Virtual
Private Networks (VPN) |
517. |
Virtual
Smart Card Solution |
518. |
VPNs:
Using a WebRamp for Low Cost Remote
Access |
519. |
We
Need a Public Key Infrastructure |
520. |
Weak
Points of One Fast Cryptographic Checksum
Algorithm and its Improvement |
521. |
What
is Diffie-Hellman? |
522. |
What's
All of the Fuss About Triple-DES? How Strong is it
Anyway? |
523. |
Who
Goes There? Authentication in the On-Line
World |
524. |
Why
Cryptography is Harder Than It Looks |
525. |
Why
Encryption on the Internet Really Works |
526. |
Why
Kyberpass is a Security Leader |
527. |
Windows
2000 Security Technical Overview |
528. |
Windows
NT Server as a CIFS Client |
529. |
Your
Surest Path to AES |
530. |
ZixMail
and ZixMail.net Basic Encryption and Delivery
Process |
531. |
µ
PKI Technical Whitepaper
v1.1 |