Mulder Training & Consultancy provides courses and guidance about how to use IBM's cryptographic products. Both standard courses or on site customer specific courses can be provided worldwide.
ECC cryptography for secure devices & software from Certicom addresses wireless security, anti-cloning, VoIP, DRM, & IPSec, along with government requirements like FIPS 140-2 and Suite B
This presentation of displacement cryptography here is intended to show the condensed results of the development work that has been ongoing on a companion site called, http://www.adacrypt.com for about ten years in a more concise form.
MultiObfuscator cryptography & obfuscation. Deniable cryptography software, professional and freeware, with a lot of data obfuscation and unique security features.
MultiObfuscator cryptography & obfuscation. Deniable cryptography software, professional and freeware, with a lot of data obfuscation and unique security features.