×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [cleartext data]
Automating a Secure MongoDB Deployment with Opscode and Gazzang
725 views
A 021481464
213 views
EE515/IS523 Think Like an Adversary Lecture 6 Access Control/Usability Yongdae Kim
214 views
Cryptography. Terminology Algorithm Mathematical rules used for encryption and decryption Mathematical rules used for encryption and decryptionCiphertext
217 views
1 Boundary Control Chapter 10. 2 Materi: Boundary controls: Cryptographic controls Access controls Personal identification numbers Digital signatures
223 views
Towards Mobile Cryptography Authors: Tomas Sander Christian F. Tschudin Presented: Xiang Lin
215 views