We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,256 results
  1. Email Security: S/MIME

    S/MIME is a standard to encrypt and digitally sign e-mails, which is fully compatible with the MIME data format. It uses PKCS#7/CMS as cryptographic...
    Chapter 2022
  2. Attacks on S/MIME and OpenPGP

    The conceptual weaknesses of the cryptographic constructs used in S/MIME and OpenPGP have been known since 2000. In 2018, these weaknesses were...
    Chapter 2022
  3. Issue and Manage S/MIME Secure Email Certificates

    An S/MIME digital certificate is similar to a TLS Client certificate, except that it is used for key exchange and authentication in S/MIME secure...
    Chapter 2022
  4. S/MIME und PGP im selben Client

    Klaus Schmeh, Matthias Edelhoff in Datenschutz und Datensicherheit - DuD
    Article 28 June 2022
  5. S/MIME Secure Email

    Years ago, there were a variety of incompatible schemes for attaching files to emails. The IETF created a standard for email attachments which is now...
    Chapter 2022
  6. S/MIME

    Im Gegensatz zum OpenPGP-Datenformat, das auch für andere Einsatzzwecke wie z. B. Dateiverschlüsselung verwendet wird, wurde S/MIME ausschließlich...
    Chapter 2020
  7. Angriffe auf S/MIME und OpenPGP

    Die im Bereich der E-Mail-Sicherheit verwendete Kryptographie (S/MIME, OpenPGP) stammt aus den 1990er Jahren. Zwar wurden die kryptographischen...
    Chapter 2020
  8. Computer Network Security Protocols

    The rapid growth of the Internet and corresponding Internet community has fueled the rapid growth of both individual and business communications...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  9. Pro Active Directory Certificate Services Creating and Managing Digital Certificates for Use in Microsoft Networks

    In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption,...

    Lawrence E. Hughes
    Book 2022
  10. Asymmetric Key Cryptography

    Asymmetric encryption is a brand-new, highly advanced encryption method that employs two keys. Public and private keys are the names given to these...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  11. Key Management

    Managing cryptographic keys is one of the most difficult parts of a cryptographic system. It is particularly difficult if only symmetric key...
    Chapter 2022
  12. Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?

    E-mail is nearly 50 years old and is still one of the most used communication protocols nowadays. However, it has no support for End-to-end...
    Katharina Schiller, Florian Adamsky in Socio-Technical Aspects in Security
    Conference paper 2022
  13. PrivMail: A Privacy-Preserving Framework for Secure Emails

    Emails have improved our workplace efficiency and communication. However, they are often processed unencrypted by mail servers, leaving them open to...
    Gowri R. Chandran, Raine Nieminen, ... Ajith Suresh in Computer Security – ESORICS 2023
    Conference paper 2024
  14. An Email a Day Could Give Your Health Data Away

    Are doctors allowed to communicate with their patients via email? The GDPR sets the bar high for securing health data: either an...
    Christof Lange, Thomas Chang, ... Ronald Petrlic in Data Privacy Management, Cryptocurrencies and Blockchain Technology
    Conference paper 2023
  15. A One-Size-Fits-Three Representation Learning Framework for Patient Similarity Search

    Patient similarity search is an essential task in healthcare. Recent studies adopted electronic health records (EHRs) to learn patient...

    Yefan Huang, Feng Luo, ... Bin Luo in Data Science and Engineering
    Article Open access 12 August 2023
  16. Computer Network Security Fundamentals

    In this chapter, we give a general definition of the state of security in any environment and then localize this security concept in a computer...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  17. Imitation Learning of Long-Horizon Manipulation Tasks Through Temporal Sub-action Sequencing

    This research proposes an approach to long-horizon manipulation which uses video and kinesthetic demonstrations to imitate human actions. The task...
    Niharika Singh, Samrat Dutta, ... Tushar Sandhan in Computer Vision and Image Processing
    Conference paper 2024
Did you find what you were looking for? Share feedback.