 |
TPVS - A company you can trust
encryption, privacy, anti software piracy, UPE,
universal program encryption, BarbedWare, barbedware, secure key hiding, SKH,
secure key hiding, SKH, software protection,
unbreakable encryption, encryption technology, virus, worm, secure backdoor,
wiretapping, privacy, computer security, viral marketing, ideavirus, investment
possibility, invest, cracking contest, job,
e-money, e-buck, e-dollar, e-gold, electronic money, financial cryptography,
cryptology, cryptography, crypto, cypherpunk,
law enforcement, encryption, cryptanalysis, cleptography, key escrow, GAK, coderpunks,
Alice and Bob, crypto protocol, bit commitment,
PK, public key, private key, secure key manegement, flexible key management,
digital signatures, virtual private networks, VPN, public key cryptography, private key,
DES, triple DES, Blowfish, Rijndael, AES, RSA, A5, GSM, SIM, Subscriber Identification
Module, protecting privacy, intrusion of privacy, DRM, Digital Rights
Management, secure DRM solutions, SMDI, Secure Digital Music Initiative, secure
mobile agents, secure mobile code, secure mobile agents,
security architecture, survivable systems, survivable code, survivable agents,
survivable software, tamper resistant software, TRS, tamper resistant hardware,
oblivious software, oblivious hardware, tamper proof software, tamper proof hardware,
obfuscated code, obfuscated software, code obfuscation, computing by encrypted
functions, secure key hiding, secure key checking, obfuscated hardware, smart cards,
unbreakable encryption, write your code, information warfare, computer espionage,
computer forensic, computer espionage, UPE, universal program encryption, open source,
zero-knowledge proof systems, ZKPS, ZKS, zero-knowledge, zero-knowledge proof system,
proof system, trust management,
instance hiding zero-knowledge proof system, IHZKPS, IHZK,
anonymous remailers, remailers, mixmaster remailers, BooleC, BooleJ, BooleJava,
James Bond Ware, digital mixes, disappearing key,
black-box security, mobile cryptography, network survivability, reverse engineering,
dynamic analysis, static analysis, trusted software on untrustworthy hosts,
trusted software on unreliable hardware,
reliable system design, mobile agent security, information survivability,
critical infrastructure protection, proof-carrying code, computer-related risks assesment,
secure data retrieval, blinded search, blinded data retrieval, attack detection,
malicious code, protecting source code, survivability architectures, anonymous network,
code safety, security of mobile code systems, obfuscating Java code, obfuscating C code,
P=?NP, P vs NP, P=NP, algorithmic complexity, computational complexity,
abuse-resilient systems, obfuscator, obfuscation, pseudo-random generator, virtual black-box,
oracle computation, hardware obfuscation, abuse resilient softvare,
white-noise computation, circuit indistinguishibility, pseudorandom function,
unobfuscatable, software watermarking, approximate obfuscator, software protection,
copy protection, homomorphic encryption, circuit obfuscator, obfuscated signature,
obfuscated public-key encryption, protecting against reverse engineering,
message authentication, obfuscated message authentication scheme, secure signatures,
efficient virus protection, survivability management, preventing intelligent tampering,
preventing impersonation, preventing man-in-the-middle attack, verification,
intrusion detection,
MAC, manipulation detection code, message digest, compression function,
contraction function, collision free, cryptographic checksum, hash function,
MIC, message integrity check, one-way hash function, trapdoor one-way function,
PRNG, pseudo-random number generator,
Net-maze.net ~
Site Info
Whois
Trace Route
RBL Check
|