Pageflakes, Netvibes, Webwag, WindowsLive, MyYahoo, Google Personalized; these are personal startpages, or portals, or web-based dynamic desktops. Desktop-based widget engines like KlipFolio and Skinkers support encrypted, password-protected data retriev
CSpace provides a platform for secure, decentralized, user-to-user communication over the internet. The driving idea behind the CSpace platform is to provide a connect(user,service) primitive, similar to the sockets API connect(ip,port). Applications built on top of CSpace can simply invoke connect(user,service) to establish a connection. The CSpace platform will take care of locating the user and creating a secure, nat/firewall friendly connection.
Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a "security guru," Schneier is best known as a refreshingly candid and lucid security critic and commentator.
Jasypt 1.3 will be released mid-May 2007, featuring changes in the provider API which will allow the use of non-default JCE providers like Bouncy Castle. With this, any PBE or digest algorithm you can get from any JCE provider will be available for you to use with Jasypt. Stay tuned for the new release at the jasypt-announce mailing list.
Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance.
aSSL is a library distributed under MIT License thats implements a technology similar to SSL without HTTPS. aSSL is composed from a file .js and a server component. Currently, the ASP and PHP components are ready. I'm developing Ruby and Java components a
Promether marks the end of surveillance and brings about a new era of online privacy,security, and anonymity. By merging blockchain technology, decentralized networks, and state-of-the-art encryption, Promether gives power and control back to the users.
M. Shah, and S. Pathak. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XI):
01-04(November 2017)1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET..